Commit 9abc4e66 authored by David Howells's avatar David Howells

KEYS: Rename public key parameter name arrays

Rename the arrays of public key parameters (public key algorithm names, hash
algorithm names and ID type names) so that the array name ends in "_name".
Signed-off-by: default avatarDavid Howells <dhowells@redhat.com>
Reviewed-by: default avatarKees Cook <keescook@chromium.org>
Reviewed-by: default avatarJosh Boyer <jwboyer@redhat.com>
parent f36f8c75
...@@ -22,13 +22,13 @@ ...@@ -22,13 +22,13 @@
MODULE_LICENSE("GPL"); MODULE_LICENSE("GPL");
const char *const pkey_algo[PKEY_ALGO__LAST] = { const char *const pkey_algo_name[PKEY_ALGO__LAST] = {
[PKEY_ALGO_DSA] = "DSA", [PKEY_ALGO_DSA] = "DSA",
[PKEY_ALGO_RSA] = "RSA", [PKEY_ALGO_RSA] = "RSA",
}; };
EXPORT_SYMBOL_GPL(pkey_algo); EXPORT_SYMBOL_GPL(pkey_algo_name);
const char *const pkey_hash_algo[PKEY_HASH__LAST] = { const char *const pkey_hash_algo_name[PKEY_HASH__LAST] = {
[PKEY_HASH_MD4] = "md4", [PKEY_HASH_MD4] = "md4",
[PKEY_HASH_MD5] = "md5", [PKEY_HASH_MD5] = "md5",
[PKEY_HASH_SHA1] = "sha1", [PKEY_HASH_SHA1] = "sha1",
...@@ -38,13 +38,13 @@ const char *const pkey_hash_algo[PKEY_HASH__LAST] = { ...@@ -38,13 +38,13 @@ const char *const pkey_hash_algo[PKEY_HASH__LAST] = {
[PKEY_HASH_SHA512] = "sha512", [PKEY_HASH_SHA512] = "sha512",
[PKEY_HASH_SHA224] = "sha224", [PKEY_HASH_SHA224] = "sha224",
}; };
EXPORT_SYMBOL_GPL(pkey_hash_algo); EXPORT_SYMBOL_GPL(pkey_hash_algo_name);
const char *const pkey_id_type[PKEY_ID_TYPE__LAST] = { const char *const pkey_id_type_name[PKEY_ID_TYPE__LAST] = {
[PKEY_ID_PGP] = "PGP", [PKEY_ID_PGP] = "PGP",
[PKEY_ID_X509] = "X509", [PKEY_ID_X509] = "X509",
}; };
EXPORT_SYMBOL_GPL(pkey_id_type); EXPORT_SYMBOL_GPL(pkey_id_type_name);
/* /*
* Provide a part of a description of the key for /proc/keys. * Provide a part of a description of the key for /proc/keys.
...@@ -56,7 +56,7 @@ static void public_key_describe(const struct key *asymmetric_key, ...@@ -56,7 +56,7 @@ static void public_key_describe(const struct key *asymmetric_key,
if (key) if (key)
seq_printf(m, "%s.%s", seq_printf(m, "%s.%s",
pkey_id_type[key->id_type], key->algo->name); pkey_id_type_name[key->id_type], key->algo->name);
} }
/* /*
......
...@@ -49,7 +49,7 @@ static int x509_check_signature(const struct public_key *pub, ...@@ -49,7 +49,7 @@ static int x509_check_signature(const struct public_key *pub,
/* Allocate the hashing algorithm we're going to need and find out how /* Allocate the hashing algorithm we're going to need and find out how
* big the hash operational data will be. * big the hash operational data will be.
*/ */
tfm = crypto_alloc_shash(pkey_hash_algo[cert->sig_hash_algo], 0, 0); tfm = crypto_alloc_shash(pkey_hash_algo_name[cert->sig_hash_algo], 0, 0);
if (IS_ERR(tfm)) if (IS_ERR(tfm))
return (PTR_ERR(tfm) == -ENOENT) ? -ENOPKG : PTR_ERR(tfm); return (PTR_ERR(tfm) == -ENOENT) ? -ENOPKG : PTR_ERR(tfm);
...@@ -117,7 +117,7 @@ static int x509_key_preparse(struct key_preparsed_payload *prep) ...@@ -117,7 +117,7 @@ static int x509_key_preparse(struct key_preparsed_payload *prep)
pr_devel("Cert Issuer: %s\n", cert->issuer); pr_devel("Cert Issuer: %s\n", cert->issuer);
pr_devel("Cert Subject: %s\n", cert->subject); pr_devel("Cert Subject: %s\n", cert->subject);
pr_devel("Cert Key Algo: %s\n", pkey_algo[cert->pkey_algo]); pr_devel("Cert Key Algo: %s\n", pkey_algo_name[cert->pkey_algo]);
pr_devel("Cert Valid From: %04ld-%02d-%02d %02d:%02d:%02d\n", pr_devel("Cert Valid From: %04ld-%02d-%02d %02d:%02d:%02d\n",
cert->valid_from.tm_year + 1900, cert->valid_from.tm_mon + 1, cert->valid_from.tm_year + 1900, cert->valid_from.tm_mon + 1,
cert->valid_from.tm_mday, cert->valid_from.tm_hour, cert->valid_from.tm_mday, cert->valid_from.tm_hour,
...@@ -127,8 +127,8 @@ static int x509_key_preparse(struct key_preparsed_payload *prep) ...@@ -127,8 +127,8 @@ static int x509_key_preparse(struct key_preparsed_payload *prep)
cert->valid_to.tm_mday, cert->valid_to.tm_hour, cert->valid_to.tm_mday, cert->valid_to.tm_hour,
cert->valid_to.tm_min, cert->valid_to.tm_sec); cert->valid_to.tm_min, cert->valid_to.tm_sec);
pr_devel("Cert Signature: %s + %s\n", pr_devel("Cert Signature: %s + %s\n",
pkey_algo[cert->sig_pkey_algo], pkey_algo_name[cert->sig_pkey_algo],
pkey_hash_algo[cert->sig_hash_algo]); pkey_hash_algo_name[cert->sig_hash_algo]);
if (!cert->fingerprint || !cert->authority) { if (!cert->fingerprint || !cert->authority) {
pr_warn("Cert for '%s' must have SubjKeyId and AuthKeyId extensions\n", pr_warn("Cert for '%s' must have SubjKeyId and AuthKeyId extensions\n",
......
...@@ -22,7 +22,7 @@ enum pkey_algo { ...@@ -22,7 +22,7 @@ enum pkey_algo {
PKEY_ALGO__LAST PKEY_ALGO__LAST
}; };
extern const char *const pkey_algo[PKEY_ALGO__LAST]; extern const char *const pkey_algo_name[PKEY_ALGO__LAST];
enum pkey_hash_algo { enum pkey_hash_algo {
PKEY_HASH_MD4, PKEY_HASH_MD4,
...@@ -36,7 +36,7 @@ enum pkey_hash_algo { ...@@ -36,7 +36,7 @@ enum pkey_hash_algo {
PKEY_HASH__LAST PKEY_HASH__LAST
}; };
extern const char *const pkey_hash_algo[PKEY_HASH__LAST]; extern const char *const pkey_hash_algo_name[PKEY_HASH__LAST];
enum pkey_id_type { enum pkey_id_type {
PKEY_ID_PGP, /* OpenPGP generated key ID */ PKEY_ID_PGP, /* OpenPGP generated key ID */
...@@ -44,7 +44,7 @@ enum pkey_id_type { ...@@ -44,7 +44,7 @@ enum pkey_id_type {
PKEY_ID_TYPE__LAST PKEY_ID_TYPE__LAST
}; };
extern const char *const pkey_id_type[PKEY_ID_TYPE__LAST]; extern const char *const pkey_id_type_name[PKEY_ID_TYPE__LAST];
/* /*
* Cryptographic data for the public-key subtype of the asymmetric key type. * Cryptographic data for the public-key subtype of the asymmetric key type.
......
...@@ -54,7 +54,7 @@ static struct public_key_signature *mod_make_digest(enum pkey_hash_algo hash, ...@@ -54,7 +54,7 @@ static struct public_key_signature *mod_make_digest(enum pkey_hash_algo hash,
/* Allocate the hashing algorithm we're going to need and find out how /* Allocate the hashing algorithm we're going to need and find out how
* big the hash operational data will be. * big the hash operational data will be.
*/ */
tfm = crypto_alloc_shash(pkey_hash_algo[hash], 0, 0); tfm = crypto_alloc_shash(pkey_hash_algo_name[hash], 0, 0);
if (IS_ERR(tfm)) if (IS_ERR(tfm))
return (PTR_ERR(tfm) == -ENOENT) ? ERR_PTR(-ENOPKG) : ERR_CAST(tfm); return (PTR_ERR(tfm) == -ENOENT) ? ERR_PTR(-ENOPKG) : ERR_CAST(tfm);
...@@ -217,7 +217,7 @@ int mod_verify_sig(const void *mod, unsigned long *_modlen) ...@@ -217,7 +217,7 @@ int mod_verify_sig(const void *mod, unsigned long *_modlen)
return -ENOPKG; return -ENOPKG;
if (ms.hash >= PKEY_HASH__LAST || if (ms.hash >= PKEY_HASH__LAST ||
!pkey_hash_algo[ms.hash]) !pkey_hash_algo_name[ms.hash])
return -ENOPKG; return -ENOPKG;
key = request_asymmetric_key(sig, ms.signer_len, key = request_asymmetric_key(sig, ms.signer_len,
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment