diff options
author | Jim Mussared <jim.mussared@gmail.com> | 2020-03-02 22:35:22 +1100 |
---|---|---|
committer | Damien George <damien.p.george@gmail.com> | 2020-04-05 15:02:06 +1000 |
commit | def76fe4d9bbc2c342594dc05861b24d7165d274 (patch) | |
tree | d04ad778e2421de0a85835227ba5bcb08562ec24 /extmod/moducryptolib.c | |
parent | 85858e72dfdc3e941c2e620e94de05ad663138b1 (diff) |
all: Use MP_ERROR_TEXT for all error messages.
Diffstat (limited to 'extmod/moducryptolib.c')
-rw-r--r-- | extmod/moducryptolib.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/extmod/moducryptolib.c b/extmod/moducryptolib.c index b15f10c23..9ea24c9fd 100644 --- a/extmod/moducryptolib.c +++ b/extmod/moducryptolib.c @@ -225,7 +225,7 @@ STATIC mp_obj_t ucryptolib_aes_make_new(const mp_obj_type_t *type, size_t n_args break; default: - mp_raise_ValueError("mode"); + mp_raise_ValueError(MP_ERROR_TEXT("mode")); } mp_obj_aes_t *o = m_new_obj_var(mp_obj_aes_t, struct ctr_params, !!is_ctr_mode(block_mode)); @@ -237,7 +237,7 @@ STATIC mp_obj_t ucryptolib_aes_make_new(const mp_obj_type_t *type, size_t n_args mp_buffer_info_t keyinfo; mp_get_buffer_raise(args[0], &keyinfo, MP_BUFFER_READ); if (32 != keyinfo.len && 16 != keyinfo.len) { - mp_raise_ValueError("key"); + mp_raise_ValueError(MP_ERROR_TEXT("key")); } mp_buffer_info_t ivinfo; @@ -246,10 +246,10 @@ STATIC mp_obj_t ucryptolib_aes_make_new(const mp_obj_type_t *type, size_t n_args mp_get_buffer_raise(args[2], &ivinfo, MP_BUFFER_READ); if (16 != ivinfo.len) { - mp_raise_ValueError("IV"); + mp_raise_ValueError(MP_ERROR_TEXT("IV")); } } else if (o->block_mode == UCRYPTOLIB_MODE_CBC || is_ctr_mode(o->block_mode)) { - mp_raise_ValueError("IV"); + mp_raise_ValueError(MP_ERROR_TEXT("IV")); } if (is_ctr_mode(block_mode)) { @@ -274,7 +274,7 @@ STATIC mp_obj_t aes_process(size_t n_args, const mp_obj_t *args, bool encrypt) { mp_get_buffer_raise(in_buf, &in_bufinfo, MP_BUFFER_READ); if (!is_ctr_mode(self->block_mode) && in_bufinfo.len % 16 != 0) { - mp_raise_ValueError("blksize % 16"); + mp_raise_ValueError(MP_ERROR_TEXT("blksize % 16")); } vstr_t vstr; @@ -284,7 +284,7 @@ STATIC mp_obj_t aes_process(size_t n_args, const mp_obj_t *args, bool encrypt) { if (out_buf != MP_OBJ_NULL) { mp_get_buffer_raise(out_buf, &out_bufinfo, MP_BUFFER_WRITE); if (out_bufinfo.len < in_bufinfo.len) { - mp_raise_ValueError("output too small"); + mp_raise_ValueError(MP_ERROR_TEXT("output too small")); } out_buf_ptr = out_bufinfo.buf; } else { @@ -301,7 +301,7 @@ STATIC mp_obj_t aes_process(size_t n_args, const mp_obj_t *args, bool encrypt) { if ((encrypt && self->key_type == AES_KEYTYPE_DEC) || (!encrypt && self->key_type == AES_KEYTYPE_ENC)) { - mp_raise_ValueError("can't encrypt & decrypt"); + mp_raise_ValueError(MP_ERROR_TEXT("can't encrypt & decrypt")); } } |