@@ -323,7 +323,7 @@ static void AddDevicePlain(void)
323323
324324 uint64_t size , r_size ;
325325
326- crypt_decode_key (key , vk_hex , key_size );
326+ OK_ ( crypt_decode_key (key , vk_hex , key_size ) );
327327 FAIL_ (crypt_init (& cd , "" ), "empty device string" );
328328 FAIL_ (crypt_init (& cd , DEVICE_WRONG ), "nonexistent device name " );
329329 FAIL_ (crypt_init (& cd , DEVICE_CHAR ), "character device as backing device" );
@@ -806,8 +806,8 @@ static void AddDeviceLuks(void)
806806 uint64_t r_payload_offset , r_header_size , r_size_1 ;
807807 struct crypt_pbkdf_type pbkdf ;
808808
809- crypt_decode_key (key , vk_hex , key_size );
810- crypt_decode_key (key3 , vk_hex2 , key_size );
809+ OK_ ( crypt_decode_key (key , vk_hex , key_size ) );
810+ OK_ ( crypt_decode_key (key3 , vk_hex2 , key_size ) );
811811
812812 // init test devices
813813 OK_ (get_luks_offsets (1 , key_size , 0 , 0 , & r_header_size , & r_payload_offset ));
@@ -1139,7 +1139,7 @@ static void LuksHeaderRestore(void)
11391139 const char * cipher_mode = "cbc-essiv:sha256" ;
11401140 uint64_t r_payload_offset ;
11411141
1142- crypt_decode_key (key , vk_hex , key_size );
1142+ OK_ ( crypt_decode_key (key , vk_hex , key_size ) );
11431143
11441144 OK_ (get_luks_offsets (0 , key_size , params .data_alignment , 0 , NULL , & r_payload_offset ));
11451145 OK_ (create_dmdevice_over_loop (L_DEVICE_OK , r_payload_offset + 5000 ));
@@ -1227,7 +1227,7 @@ static void LuksHeaderLoad(void)
12271227 uint64_t r_payload_offset , r_header_size ;
12281228 uint64_t mdata_size , keyslots_size ;
12291229
1230- crypt_decode_key (key , vk_hex , key_size );
1230+ OK_ ( crypt_decode_key (key , vk_hex , key_size ) );
12311231
12321232 // prepare test env
12331233 OK_ (get_luks_offsets (0 , key_size , params .data_alignment , 0 , & r_header_size , & r_payload_offset ));
@@ -1340,7 +1340,7 @@ static void LuksHeaderBackup(void)
13401340
13411341 const char * passphrase = PASSPHRASE ;
13421342
1343- crypt_decode_key (key , vk_hex , key_size );
1343+ OK_ ( crypt_decode_key (key , vk_hex , key_size ) );
13441344
13451345 OK_ (get_luks_offsets (0 , key_size , params .data_alignment , 0 , NULL , & r_payload_offset ));
13461346 OK_ (create_dmdevice_over_loop (L_DEVICE_OK , r_payload_offset + 1 ));
@@ -1420,7 +1420,7 @@ static void ResizeDeviceLuks(void)
14201420 const char * cipher_mode = "cbc-essiv:sha256" ;
14211421 uint64_t r_payload_offset , r_header_size , r_size ;
14221422
1423- crypt_decode_key (key , vk_hex , key_size );
1423+ OK_ ( crypt_decode_key (key , vk_hex , key_size ) );
14241424
14251425 // prepare env
14261426 OK_ (get_luks_offsets (0 , key_size , params .data_alignment , 0 , NULL , & r_payload_offset ));
@@ -1517,7 +1517,7 @@ static void HashDevicePlain(void)
15171517 // 0 1 2 3 4 5 6 7 8 9 a b c d e f
15181518 vk_hex = "caffeecaffeecaffeecaffeecaffee88" ;
15191519 key_size = 16 ;
1520- crypt_decode_key (key , vk_hex , key_size );
1520+ OK_ ( crypt_decode_key (key , vk_hex , key_size ) );
15211521 OK_ (prepare_keyfile (KEYFILE1 , key , key_size ));
15221522 OK_ (crypt_activate_by_keyfile (cd , CDEVICE_1 , CRYPT_ANY_SLOT , KEYFILE1 , key_size , 0 ));
15231523 OK_ (get_key_dm (CDEVICE_1 , key , sizeof (key )));
@@ -1537,7 +1537,7 @@ static void HashDevicePlain(void)
15371537 // 0 1 2 3 4 5 6 7 8 9 a b c d e f
15381538 vk_hex = "caffeecaffeecaffeecaffeecaffee88babebabe" ;
15391539 key_size = 16 ;
1540- crypt_decode_key (key , vk_hex , strlen (vk_hex ) / 2 );
1540+ OK_ ( crypt_decode_key (key , vk_hex , strlen (vk_hex ) / 2 ) );
15411541 OK_ (prepare_keyfile (KEYFILE1 , key , strlen (vk_hex ) / 2 ));
15421542 OK_ (crypt_activate_by_keyfile (cd , CDEVICE_1 , CRYPT_ANY_SLOT , KEYFILE1 , key_size , 0 ));
15431543 OK_ (get_key_dm (CDEVICE_1 , key , sizeof (key )));
@@ -1560,7 +1560,7 @@ static void HashDevicePlain(void)
15601560 // 0 1 2 3 4 5 6 7 8 9 a b c d e f
15611561 vk_hex = "aabbcaffeecaffeecaffeecaffeecaff" ;
15621562 key_size = 16 ;
1563- crypt_decode_key (key , vk_hex , key_size );
1563+ OK_ ( crypt_decode_key (key , vk_hex , key_size ) );
15641564 OK_ (prepare_keyfile (KEYFILE1 , key , strlen (vk_hex ) / 2 ));
15651565 OK_ (crypt_init (& cd , DEVICE_1 ));
15661566 OK_ (crypt_format (cd , CRYPT_PLAIN , "aes" , "cbc-essiv:sha256" , NULL , NULL , 16 , & params ));
@@ -1631,8 +1631,8 @@ static void VerityTest(void)
16311631 .flags = CRYPT_VERITY_CREATE_HASH ,
16321632 };
16331633
1634- crypt_decode_key (salt , salt_hex , strlen (salt_hex ) / 2 );
1635- crypt_decode_key (root_hash , root_hex , strlen (root_hex ) / 2 );
1634+ OK_ ( crypt_decode_key (salt , salt_hex , strlen (salt_hex ) / 2 ) );
1635+ OK_ ( crypt_decode_key (root_hash , root_hex , strlen (root_hex ) / 2 ) );
16361636
16371637 /* Format */
16381638 OK_ (crypt_init (& cd , DEVICE_2 ));
@@ -1762,7 +1762,7 @@ static void TcryptTest(void)
17621762 "3979531d1cdc18af62757cf22286f16f8583d848524f128d7594ac2082668c73" ;
17631763 int r ;
17641764
1765- crypt_decode_key (key_def , key_hex , strlen (key_hex ) / 2 );
1765+ OK_ ( crypt_decode_key (key_def , key_hex , strlen (key_hex ) / 2 ) );
17661766
17671767 // First ensure we can use af_alg skcipher interface
17681768 r = crypt_benchmark (NULL , "aes" , "xts" , 512 , 16 , 1024 , & enc_mbr , & dec_mbr );
@@ -1936,9 +1936,9 @@ static void ResizeIntegrityWithKey(void)
19361936 size_t journal_integrity_key_size = strlen (key_journal_integrity_hex ) / 2 ;
19371937 size_t journal_crypt_key_size = strlen (key_journal_crypt_hex ) / 2 ;
19381938
1939- crypt_decode_key (integrity_key , key_integrity_hex , integrity_key_size );
1940- crypt_decode_key (journal_integrity_key , key_journal_integrity_hex , journal_integrity_key_size );
1941- crypt_decode_key (journal_crypt_key , key_journal_crypt_hex , journal_crypt_key_size );
1939+ OK_ ( crypt_decode_key (integrity_key , key_integrity_hex , integrity_key_size ) );
1940+ OK_ ( crypt_decode_key (journal_integrity_key , key_journal_integrity_hex , journal_integrity_key_size ) );
1941+ OK_ ( crypt_decode_key (journal_crypt_key , key_journal_crypt_hex , journal_crypt_key_size ) );
19421942
19431943 params .integrity_key_size = integrity_key_size ;
19441944
@@ -2016,7 +2016,7 @@ static void IntegrityTest(void)
20162016 size_t integrity_key_size = strlen (key_integrity_hex ) / 2 ;
20172017 char integrity_key [128 ];
20182018
2019- crypt_decode_key (integrity_key , key_integrity_hex , integrity_key_size );
2019+ OK_ ( crypt_decode_key (integrity_key , key_integrity_hex , integrity_key_size ) );
20202020 params2 .integrity_key_size = integrity_key_size ;
20212021
20222022 OK_ (crypt_init (& cd , DEVICE_1 ));
@@ -2139,8 +2139,8 @@ static void LuksKeyslotAdd(void)
21392139 uint64_t r_payload_offset ;
21402140 struct crypt_keyslot_context * um1 , * um2 ;
21412141
2142- crypt_decode_key (key , vk_hex , key_size );
2143- crypt_decode_key (key3 , vk_hex2 , key_size );
2142+ OK_ ( crypt_decode_key (key , vk_hex , key_size ) );
2143+ OK_ ( crypt_decode_key (key3 , vk_hex2 , key_size ) );
21442144
21452145 // init test devices
21462146 OK_ (get_luks_offsets (0 , key_size , params .data_alignment , 0 , NULL , & r_payload_offset ));
@@ -2245,7 +2245,7 @@ static void VolumeKeyGet(void)
22452245 uint64_t r_payload_offset ;
22462246 struct crypt_keyslot_context * um1 , * um2 ;
22472247
2248- crypt_decode_key (key , vk_hex , key_size );
2248+ OK_ ( crypt_decode_key (key , vk_hex , key_size ) );
22492249
22502250 OK_ (prepare_keyfile (KEYFILE1 , PASSPHRASE1 , strlen (PASSPHRASE1 )));
22512251
0 commit comments