Browse Source

Improve variable naming

Signed-off-by: Steffen Jaeckel <[email protected]>
Steffen Jaeckel 4 months ago
parent
commit
87d51de391
3 changed files with 28 additions and 28 deletions
  1. 1 1
      src/headers/tomcrypt_private.h
  2. 20 20
      src/misc/pem/pem_pkcs.c
  3. 7 7
      src/misc/pem/pem_read.c

+ 1 - 1
src/headers/tomcrypt_private.h

@@ -387,7 +387,7 @@ int pem_decrypt(unsigned char *data, unsigned long *datalen,
 int pem_get_char_from_file(struct get_char *g);
 int pem_get_char_from_file(struct get_char *g);
 #endif /* LTC_NO_FILE */
 #endif /* LTC_NO_FILE */
 int pem_get_char_from_buf(struct get_char *g);
 int pem_get_char_from_buf(struct get_char *g);
-int pem_read(void *pem, unsigned long *w, struct pem_headers *hdr, struct get_char *g);
+int pem_read(void *asn1_cert, unsigned long *asn1_len, struct pem_headers *hdr, struct get_char *g);
 #endif
 #endif
 
 
 /* tomcrypt_pk.h */
 /* tomcrypt_pk.h */

+ 20 - 20
src/misc/pem/pem_pkcs.c

@@ -12,7 +12,7 @@
 extern const struct pem_header_id pem_std_headers[];
 extern const struct pem_header_id pem_std_headers[];
 extern const unsigned long pem_std_headers_num;
 extern const unsigned long pem_std_headers_num;
 
 
-static int s_decrypt_pem(unsigned char *pem, unsigned long *l, const struct pem_headers *hdr)
+static int s_decrypt_pem(unsigned char *asn1_cert, unsigned long *asn1_len, const struct pem_headers *hdr)
 {
 {
    unsigned char iv[MAXBLOCKSIZE], key[MAXBLOCKSIZE];
    unsigned char iv[MAXBLOCKSIZE], key[MAXBLOCKSIZE];
    unsigned long ivlen, klen;
    unsigned long ivlen, klen;
@@ -34,7 +34,7 @@ static int s_decrypt_pem(unsigned char *pem, unsigned long *l, const struct pem_
       return err;
       return err;
    }
    }
 
 
-   err = pem_decrypt(pem, l, key, klen, iv, ivlen, NULL, 0, &hdr->info, LTC_PAD_PKCS7);
+   err = pem_decrypt(asn1_cert, asn1_len, key, klen, iv, ivlen, NULL, 0, &hdr->info, LTC_PAD_PKCS7);
 
 
    zeromem(key, sizeof(key));
    zeromem(key, sizeof(key));
    zeromem(iv, sizeof(iv));
    zeromem(iv, sizeof(iv));
@@ -82,12 +82,12 @@ static const import_fn s_import_x509_fns[LTC_PKA_NUM] = {
 #endif
 #endif
 };
 };
 
 
-static int s_import_x509(unsigned char *pem, unsigned long l, ltc_pka_key *k)
+static int s_import_x509(unsigned char *asn1_cert, unsigned long asn1_len, ltc_pka_key *k)
 {
 {
    enum ltc_pka_id pka = LTC_PKA_UNDEF;
    enum ltc_pka_id pka = LTC_PKA_UNDEF;
    ltc_asn1_list *d, *spki;
    ltc_asn1_list *d, *spki;
    int err;
    int err;
-   if ((err = x509_decode_spki(pem, l, &d, &spki)) != CRYPT_OK) {
+   if ((err = x509_decode_spki(asn1_cert, asn1_len, &d, &spki)) != CRYPT_OK) {
       return err;
       return err;
    }
    }
    err = s_get_pka(spki, &pka);
    err = s_get_pka(spki, &pka);
@@ -100,19 +100,19 @@ static int s_import_x509(unsigned char *pem, unsigned long l, ltc_pka_key *k)
          || s_import_x509_fns[pka] == NULL) {
          || s_import_x509_fns[pka] == NULL) {
       return CRYPT_PK_INVALID_TYPE;
       return CRYPT_PK_INVALID_TYPE;
    }
    }
-   if ((err = s_import_x509_fns[pka](pem, l, &k->u)) == CRYPT_OK) {
+   if ((err = s_import_x509_fns[pka](asn1_cert, asn1_len, &k->u)) == CRYPT_OK) {
       k->id = pka;
       k->id = pka;
    }
    }
    return err;
    return err;
 }
 }
 
 
-static int s_import_pkcs8(unsigned char *pem, unsigned long l, ltc_pka_key *k, const password_ctx *pw_ctx)
+static int s_import_pkcs8(unsigned char *asn1_cert, unsigned long asn1_len, ltc_pka_key *k, const password_ctx *pw_ctx)
 {
 {
    int err;
    int err;
    enum ltc_oid_id pka;
    enum ltc_oid_id pka;
    ltc_asn1_list *alg_id, *priv_key;
    ltc_asn1_list *alg_id, *priv_key;
    ltc_asn1_list *p8_asn1 = NULL;
    ltc_asn1_list *p8_asn1 = NULL;
-   if ((err = pkcs8_decode_flexi(pem, l, pw_ctx, &p8_asn1)) != CRYPT_OK) {
+   if ((err = pkcs8_decode_flexi(asn1_cert, asn1_len, pw_ctx, &p8_asn1)) != CRYPT_OK) {
       goto cleanup;
       goto cleanup;
    }
    }
    if ((err = pkcs8_get_children(p8_asn1, &pka, &alg_id, &priv_key)) != CRYPT_OK) {
    if ((err = pkcs8_get_children(p8_asn1, &pka, &alg_id, &priv_key)) != CRYPT_OK) {
@@ -164,11 +164,11 @@ cleanup:
    return err;
    return err;
 }
 }
 
 
-static int s_extract_pka(unsigned char *pem, unsigned long w, enum ltc_pka_id *pka)
+static int s_extract_pka(unsigned char *asn1_cert, unsigned long asn1_len, enum ltc_pka_id *pka)
 {
 {
    ltc_asn1_list *pub;
    ltc_asn1_list *pub;
    int err = CRYPT_ERROR;
    int err = CRYPT_ERROR;
-   if ((err = der_decode_sequence_flexi(pem, &w, &pub)) != CRYPT_OK) {
+   if ((err = der_decode_sequence_flexi(asn1_cert, &asn1_len, &pub)) != CRYPT_OK) {
       return err;
       return err;
    }
    }
    err = s_get_pka(pub, pka);
    err = s_get_pka(pub, pka);
@@ -194,8 +194,8 @@ static const import_fn s_import_openssl_fns[LTC_PKA_NUM] = {
 
 
 static int s_decode(struct get_char *g, ltc_pka_key *k, const password_ctx *pw_ctx)
 static int s_decode(struct get_char *g, ltc_pka_key *k, const password_ctx *pw_ctx)
 {
 {
-   unsigned char *pem = NULL;
-   unsigned long w, l, n;
+   unsigned char *asn1_cert = NULL;
+   unsigned long w, asn1_len, n;
    int err = CRYPT_ERROR;
    int err = CRYPT_ERROR;
    struct pem_headers hdr = { 0 };
    struct pem_headers hdr = { 0 };
    struct password pw = { 0 };
    struct password pw = { 0 };
@@ -203,10 +203,10 @@ static int s_decode(struct get_char *g, ltc_pka_key *k, const password_ctx *pw_c
    XMEMSET(k, 0, sizeof(*k));
    XMEMSET(k, 0, sizeof(*k));
    w = LTC_PEM_READ_BUFSIZE * 2;
    w = LTC_PEM_READ_BUFSIZE * 2;
 retry:
 retry:
-   pem = XREALLOC(pem, w);
+   asn1_cert = XREALLOC(asn1_cert, w);
    for (n = 0; n < pem_std_headers_num; ++n) {
    for (n = 0; n < pem_std_headers_num; ++n) {
       hdr.id = &pem_std_headers[n];
       hdr.id = &pem_std_headers[n];
-      err = pem_read(pem, &w, &hdr, g);
+      err = pem_read(asn1_cert, &w, &hdr, g);
       if (err == CRYPT_BUFFER_OVERFLOW) {
       if (err == CRYPT_BUFFER_OVERFLOW) {
          goto retry;
          goto retry;
       } else if (err == CRYPT_OK) {
       } else if (err == CRYPT_OK) {
@@ -219,15 +219,15 @@ retry:
    /* id not found */
    /* id not found */
    if (hdr.id == NULL)
    if (hdr.id == NULL)
       goto cleanup;
       goto cleanup;
-   l = w;
+   asn1_len = w;
    if (hdr.id->flags & pf_pkcs8) {
    if (hdr.id->flags & pf_pkcs8) {
-      err = s_import_pkcs8(pem, l, k, pw_ctx);
+      err = s_import_pkcs8(asn1_cert, asn1_len, k, pw_ctx);
       goto cleanup;
       goto cleanup;
    } else if (hdr.id->flags == pf_x509) {
    } else if (hdr.id->flags == pf_x509) {
-      err = s_import_x509(pem, l, k);
+      err = s_import_x509(asn1_cert, asn1_len, k);
       goto cleanup;
       goto cleanup;
    } else if ((hdr.id->flags & pf_public) && hdr.id->pka == LTC_PKA_UNDEF) {
    } else if ((hdr.id->flags & pf_public) && hdr.id->pka == LTC_PKA_UNDEF) {
-      if ((err = s_extract_pka(pem, w, &pka)) != CRYPT_OK) {
+      if ((err = s_extract_pka(asn1_cert, asn1_len, &pka)) != CRYPT_OK) {
          goto cleanup;
          goto cleanup;
       }
       }
    } else if (hdr.encrypted) {
    } else if (hdr.encrypted) {
@@ -242,7 +242,7 @@ retry:
          goto cleanup;
          goto cleanup;
       }
       }
 
 
-      if ((err = s_decrypt_pem(pem, &l, &hdr)) != CRYPT_OK) {
+      if ((err = s_decrypt_pem(asn1_cert, &asn1_len, &hdr)) != CRYPT_OK) {
          goto cleanup;
          goto cleanup;
       }
       }
       pka = hdr.id->pka;
       pka = hdr.id->pka;
@@ -256,13 +256,13 @@ retry:
       err = CRYPT_PK_INVALID_TYPE;
       err = CRYPT_PK_INVALID_TYPE;
       goto cleanup;
       goto cleanup;
    }
    }
-   if ((err = s_import_openssl_fns[pka](pem, l, &k->u)) == CRYPT_OK) {
+   if ((err = s_import_openssl_fns[pka](asn1_cert, asn1_len, &k->u)) == CRYPT_OK) {
       k->id = pka;
       k->id = pka;
    }
    }
 
 
 cleanup:
 cleanup:
    password_free(hdr.pw, pw_ctx);
    password_free(hdr.pw, pw_ctx);
-   XFREE(pem);
+   XFREE(asn1_cert);
    return err;
    return err;
 }
 }
 
 

+ 7 - 7
src/misc/pem/pem_read.c

@@ -176,11 +176,11 @@ static int s_pem_decode_headers(struct pem_headers *hdr, struct get_char *g)
    return CRYPT_OK;
    return CRYPT_OK;
 }
 }
 
 
-int pem_read(void *pem, unsigned long *w, struct pem_headers *hdr, struct get_char *g)
+int pem_read(void *asn1_cert, unsigned long *asn1_len, struct pem_headers *hdr, struct get_char *g)
 {
 {
    char buf[LTC_PEM_DECODE_BUFSZ];
    char buf[LTC_PEM_DECODE_BUFSZ];
-   char *wpem = pem;
-   char *end = wpem + *w;
+   char *wpem = asn1_cert;
+   char *end = wpem + *asn1_len;
    unsigned long slen, linelen;
    unsigned long slen, linelen;
    int err, hdr_ok = 0;
    int err, hdr_ok = 0;
    int would_overflow = 0;
    int would_overflow = 0;
@@ -226,16 +226,16 @@ int pem_read(void *pem, unsigned long *w, struct pem_headers *hdr, struct get_ch
       /* NUL termination */
       /* NUL termination */
       wpem++;
       wpem++;
       /* prevent a wrap-around */
       /* prevent a wrap-around */
-      if (wpem < (char*)pem)
+      if (wpem < (char*)asn1_cert)
          return CRYPT_OVERFLOW;
          return CRYPT_OVERFLOW;
-      *w = wpem - (char*)pem;
+      *asn1_len = wpem - (char*)asn1_cert;
       return CRYPT_BUFFER_OVERFLOW;
       return CRYPT_BUFFER_OVERFLOW;
    }
    }
 
 
-   *w = wpem - (char*)pem;
+   *asn1_len = wpem - (char*)asn1_cert;
    *wpem++ = '\0';
    *wpem++ = '\0';
 
 
-   if ((err = base64_strict_decode(pem, *w, pem, w)) != CRYPT_OK) {
+   if ((err = base64_strict_decode(asn1_cert, *asn1_len, asn1_cert, asn1_len)) != CRYPT_OK) {
       return err;
       return err;
    }
    }
    return CRYPT_OK;
    return CRYPT_OK;