aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDavid Howells <dhowells@redhat.com>2013-08-30 11:15:10 -0400
committerDavid Howells <dhowells@redhat.com>2013-09-25 10:51:07 -0400
commit9abc4e66eb839c28516916543768be08c814a3c8 (patch)
tree1cf2c1715b7c9ea166338a84d37ff90ea6254591
parentf36f8c75ae2e7d4da34f4c908cebdb4aa42c977e (diff)
KEYS: Rename public key parameter name arrays
Rename the arrays of public key parameters (public key algorithm names, hash algorithm names and ID type names) so that the array name ends in "_name". Signed-off-by: David Howells <dhowells@redhat.com> Reviewed-by: Kees Cook <keescook@chromium.org> Reviewed-by: Josh Boyer <jwboyer@redhat.com>
-rw-r--r--crypto/asymmetric_keys/public_key.c14
-rw-r--r--crypto/asymmetric_keys/x509_public_key.c8
-rw-r--r--include/crypto/public_key.h6
-rw-r--r--kernel/module_signing.c4
4 files changed, 16 insertions, 16 deletions
diff --git a/crypto/asymmetric_keys/public_key.c b/crypto/asymmetric_keys/public_key.c
index cb2e29180a87..b313df1bd253 100644
--- a/crypto/asymmetric_keys/public_key.c
+++ b/crypto/asymmetric_keys/public_key.c
@@ -22,13 +22,13 @@
22 22
23MODULE_LICENSE("GPL"); 23MODULE_LICENSE("GPL");
24 24
25const char *const pkey_algo[PKEY_ALGO__LAST] = { 25const char *const pkey_algo_name[PKEY_ALGO__LAST] = {
26 [PKEY_ALGO_DSA] = "DSA", 26 [PKEY_ALGO_DSA] = "DSA",
27 [PKEY_ALGO_RSA] = "RSA", 27 [PKEY_ALGO_RSA] = "RSA",
28}; 28};
29EXPORT_SYMBOL_GPL(pkey_algo); 29EXPORT_SYMBOL_GPL(pkey_algo_name);
30 30
31const char *const pkey_hash_algo[PKEY_HASH__LAST] = { 31const char *const pkey_hash_algo_name[PKEY_HASH__LAST] = {
32 [PKEY_HASH_MD4] = "md4", 32 [PKEY_HASH_MD4] = "md4",
33 [PKEY_HASH_MD5] = "md5", 33 [PKEY_HASH_MD5] = "md5",
34 [PKEY_HASH_SHA1] = "sha1", 34 [PKEY_HASH_SHA1] = "sha1",
@@ -38,13 +38,13 @@ const char *const pkey_hash_algo[PKEY_HASH__LAST] = {
38 [PKEY_HASH_SHA512] = "sha512", 38 [PKEY_HASH_SHA512] = "sha512",
39 [PKEY_HASH_SHA224] = "sha224", 39 [PKEY_HASH_SHA224] = "sha224",
40}; 40};
41EXPORT_SYMBOL_GPL(pkey_hash_algo); 41EXPORT_SYMBOL_GPL(pkey_hash_algo_name);
42 42
43const char *const pkey_id_type[PKEY_ID_TYPE__LAST] = { 43const char *const pkey_id_type_name[PKEY_ID_TYPE__LAST] = {
44 [PKEY_ID_PGP] = "PGP", 44 [PKEY_ID_PGP] = "PGP",
45 [PKEY_ID_X509] = "X509", 45 [PKEY_ID_X509] = "X509",
46}; 46};
47EXPORT_SYMBOL_GPL(pkey_id_type); 47EXPORT_SYMBOL_GPL(pkey_id_type_name);
48 48
49/* 49/*
50 * Provide a part of a description of the key for /proc/keys. 50 * Provide a part of a description of the key for /proc/keys.
@@ -56,7 +56,7 @@ static void public_key_describe(const struct key *asymmetric_key,
56 56
57 if (key) 57 if (key)
58 seq_printf(m, "%s.%s", 58 seq_printf(m, "%s.%s",
59 pkey_id_type[key->id_type], key->algo->name); 59 pkey_id_type_name[key->id_type], key->algo->name);
60} 60}
61 61
62/* 62/*
diff --git a/crypto/asymmetric_keys/x509_public_key.c b/crypto/asymmetric_keys/x509_public_key.c
index 06007f0e880c..afbbc362f85a 100644
--- a/crypto/asymmetric_keys/x509_public_key.c
+++ b/crypto/asymmetric_keys/x509_public_key.c
@@ -49,7 +49,7 @@ static int x509_check_signature(const struct public_key *pub,
49 /* Allocate the hashing algorithm we're going to need and find out how 49 /* Allocate the hashing algorithm we're going to need and find out how
50 * big the hash operational data will be. 50 * big the hash operational data will be.
51 */ 51 */
52 tfm = crypto_alloc_shash(pkey_hash_algo[cert->sig_hash_algo], 0, 0); 52 tfm = crypto_alloc_shash(pkey_hash_algo_name[cert->sig_hash_algo], 0, 0);
53 if (IS_ERR(tfm)) 53 if (IS_ERR(tfm))
54 return (PTR_ERR(tfm) == -ENOENT) ? -ENOPKG : PTR_ERR(tfm); 54 return (PTR_ERR(tfm) == -ENOENT) ? -ENOPKG : PTR_ERR(tfm);
55 55
@@ -117,7 +117,7 @@ static int x509_key_preparse(struct key_preparsed_payload *prep)
117 117
118 pr_devel("Cert Issuer: %s\n", cert->issuer); 118 pr_devel("Cert Issuer: %s\n", cert->issuer);
119 pr_devel("Cert Subject: %s\n", cert->subject); 119 pr_devel("Cert Subject: %s\n", cert->subject);
120 pr_devel("Cert Key Algo: %s\n", pkey_algo[cert->pkey_algo]); 120 pr_devel("Cert Key Algo: %s\n", pkey_algo_name[cert->pkey_algo]);
121 pr_devel("Cert Valid From: %04ld-%02d-%02d %02d:%02d:%02d\n", 121 pr_devel("Cert Valid From: %04ld-%02d-%02d %02d:%02d:%02d\n",
122 cert->valid_from.tm_year + 1900, cert->valid_from.tm_mon + 1, 122 cert->valid_from.tm_year + 1900, cert->valid_from.tm_mon + 1,
123 cert->valid_from.tm_mday, cert->valid_from.tm_hour, 123 cert->valid_from.tm_mday, cert->valid_from.tm_hour,
@@ -127,8 +127,8 @@ static int x509_key_preparse(struct key_preparsed_payload *prep)
127 cert->valid_to.tm_mday, cert->valid_to.tm_hour, 127 cert->valid_to.tm_mday, cert->valid_to.tm_hour,
128 cert->valid_to.tm_min, cert->valid_to.tm_sec); 128 cert->valid_to.tm_min, cert->valid_to.tm_sec);
129 pr_devel("Cert Signature: %s + %s\n", 129 pr_devel("Cert Signature: %s + %s\n",
130 pkey_algo[cert->sig_pkey_algo], 130 pkey_algo_name[cert->sig_pkey_algo],
131 pkey_hash_algo[cert->sig_hash_algo]); 131 pkey_hash_algo_name[cert->sig_hash_algo]);
132 132
133 if (!cert->fingerprint || !cert->authority) { 133 if (!cert->fingerprint || !cert->authority) {
134 pr_warn("Cert for '%s' must have SubjKeyId and AuthKeyId extensions\n", 134 pr_warn("Cert for '%s' must have SubjKeyId and AuthKeyId extensions\n",
diff --git a/include/crypto/public_key.h b/include/crypto/public_key.h
index f5b0224c9967..619d5706d837 100644
--- a/include/crypto/public_key.h
+++ b/include/crypto/public_key.h
@@ -22,7 +22,7 @@ enum pkey_algo {
22 PKEY_ALGO__LAST 22 PKEY_ALGO__LAST
23}; 23};
24 24
25extern const char *const pkey_algo[PKEY_ALGO__LAST]; 25extern const char *const pkey_algo_name[PKEY_ALGO__LAST];
26 26
27enum pkey_hash_algo { 27enum pkey_hash_algo {
28 PKEY_HASH_MD4, 28 PKEY_HASH_MD4,
@@ -36,7 +36,7 @@ enum pkey_hash_algo {
36 PKEY_HASH__LAST 36 PKEY_HASH__LAST
37}; 37};
38 38
39extern const char *const pkey_hash_algo[PKEY_HASH__LAST]; 39extern const char *const pkey_hash_algo_name[PKEY_HASH__LAST];
40 40
41enum pkey_id_type { 41enum pkey_id_type {
42 PKEY_ID_PGP, /* OpenPGP generated key ID */ 42 PKEY_ID_PGP, /* OpenPGP generated key ID */
@@ -44,7 +44,7 @@ enum pkey_id_type {
44 PKEY_ID_TYPE__LAST 44 PKEY_ID_TYPE__LAST
45}; 45};
46 46
47extern const char *const pkey_id_type[PKEY_ID_TYPE__LAST]; 47extern const char *const pkey_id_type_name[PKEY_ID_TYPE__LAST];
48 48
49/* 49/*
50 * Cryptographic data for the public-key subtype of the asymmetric key type. 50 * Cryptographic data for the public-key subtype of the asymmetric key type.
diff --git a/kernel/module_signing.c b/kernel/module_signing.c
index f2970bddc5ea..ee476404167b 100644
--- a/kernel/module_signing.c
+++ b/kernel/module_signing.c
@@ -54,7 +54,7 @@ static struct public_key_signature *mod_make_digest(enum pkey_hash_algo hash,
54 /* Allocate the hashing algorithm we're going to need and find out how 54 /* Allocate the hashing algorithm we're going to need and find out how
55 * big the hash operational data will be. 55 * big the hash operational data will be.
56 */ 56 */
57 tfm = crypto_alloc_shash(pkey_hash_algo[hash], 0, 0); 57 tfm = crypto_alloc_shash(pkey_hash_algo_name[hash], 0, 0);
58 if (IS_ERR(tfm)) 58 if (IS_ERR(tfm))
59 return (PTR_ERR(tfm) == -ENOENT) ? ERR_PTR(-ENOPKG) : ERR_CAST(tfm); 59 return (PTR_ERR(tfm) == -ENOENT) ? ERR_PTR(-ENOPKG) : ERR_CAST(tfm);
60 60
@@ -217,7 +217,7 @@ int mod_verify_sig(const void *mod, unsigned long *_modlen)
217 return -ENOPKG; 217 return -ENOPKG;
218 218
219 if (ms.hash >= PKEY_HASH__LAST || 219 if (ms.hash >= PKEY_HASH__LAST ||
220 !pkey_hash_algo[ms.hash]) 220 !pkey_hash_algo_name[ms.hash])
221 return -ENOPKG; 221 return -ENOPKG;
222 222
223 key = request_asymmetric_key(sig, ms.signer_len, 223 key = request_asymmetric_key(sig, ms.signer_len,