aboutsummaryrefslogtreecommitdiff
path: root/HMAC.c
diff options
context:
space:
mode:
authorVadim Bendebury <vbendeb@chromium.org>2015-10-16 09:35:42 -0700
committerchrome-bot <chrome-bot@chromium.org>2015-10-16 19:46:20 +0000
commit065e0d7552ad876e067e56dcd8cc2a8f84bd8cc4 (patch)
tree6e19781e4d2dc07a8e127a72c655499007ca963e /HMAC.c
parent06134407fe531c7c0169e8f90ae84a2bf1a546d4 (diff)
downloadtpm2-065e0d7552ad876e067e56dcd8cc2a8f84bd8cc4.tar.gz
Replace TPM_RCS_xxx with TPM_RC_xxx
The code scraped from the TPM2 library uses return code names prefixed with TPM_RC_. But in a few places in the code the TPM_RCS_ prefix is used. TPM_RCS_ prefixed values are not defined anywhere, form the code logic they are equivalent to the corresponding TPM_RC_ prefixed values. This patch makes sure the consistent naming is used. BUG=chrome-os-partner:44608 TEST=the tests still pass. Change-Id: I342de9bdc6dd1e70e3c8268d38f02c9429980cfc Signed-off-by: Vadim Bendebury <vbendeb@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/306650 Reviewed-by: Utkarsh Sanghi <usanghi@chromium.org>
Diffstat (limited to 'HMAC.c')
-rw-r--r--HMAC.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/HMAC.c b/HMAC.c
index 21d28f8..bc672b2 100644
--- a/HMAC.c
+++ b/HMAC.c
@@ -35,15 +35,15 @@ TPM2_HMAC(
// Make sure that the key is an HMAC key
if(publicArea->type != TPM_ALG_KEYEDHASH)
- return TPM_RCS_TYPE + RC_HMAC_handle;
+ return TPM_RC_TYPE + RC_HMAC_handle;
// and that it is unrestricted
if(publicArea->objectAttributes.restricted == SET)
- return TPM_RCS_ATTRIBUTES + RC_HMAC_handle;
+ return TPM_RC_ATTRIBUTES + RC_HMAC_handle;
// and that it is a signing key
if(publicArea->objectAttributes.sign != SET)
- return TPM_RCS_KEY + RC_HMAC_handle;
+ return TPM_RC_KEY + RC_HMAC_handle;
// See if the key has a default
if(publicArea->parameters.keyedHashDetail.scheme.scheme == TPM_ALG_NULL)
@@ -60,7 +60,7 @@ TPM2_HMAC(
}
// if we ended up without a hash algorith then return an error
if(hashAlg == TPM_ALG_NULL)
- return TPM_RCS_VALUE + RC_HMAC_hashAlg;
+ return TPM_RC_VALUE + RC_HMAC_hashAlg;
// Command Output