Received: by 2002:a05:6a10:7420:0:0:0:0 with SMTP id hk32csp3914755pxb; Mon, 21 Feb 2022 08:13:25 -0800 (PST) X-Google-Smtp-Source: ABdhPJw8EPytfAhubhHdxPIlAFjqthrIkZvq1RQTeh7B0GDhBfsD3maj5S8XpmmEDXBXPsJvVpZ3 X-Received: by 2002:a17:902:b692:b0:14c:935b:2b03 with SMTP id c18-20020a170902b69200b0014c935b2b03mr19490344pls.81.1645460005038; Mon, 21 Feb 2022 08:13:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1645460005; cv=none; d=google.com; s=arc-20160816; b=uDJ69JrxZLNtKXjxRH3Y/QwmfuhB0ln8S9TncxiKyqQ6NhruVwqR1Ht/9u918CZ0wX IynVbmJ5lFpZZCR3ykKlS48dvWOXyM7XDzQHel4vTnHm+3/YM9dzKJpXETyOcrKmLYVY O7eSIkyOztY6orvLT2asAH2rb73Sba1na/tBMPTqmWVoZUYpFyEorBPFJCb7wKmvmi+p 3qOoJwLRMpI86qJsYCUytwMSroEMiXqoO/sHItWN8rqENTYUEe4ITEmwI3U4tR00kiLF QK5ScSOEJ9OCyxGHfAyEdmtxFL2L6ex0SMlo5ykrzpii9odV1f+rwmL/sOp0Oi/AcrTN bU5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-signature; bh=4WSAO4KoAjJN30nEtBuKVSDbAprmPqyfN2R4/SBnjpI=; b=yoriRI40ym01XSlFH6bUJ8nfuEjYgJRQRE/KrLVtYKh/VlB5YUPLoo/JIFQE4zwR0q obCCwWuj098jRvYkIrULYxOxBWHwlx8LtDrZvIhg7DcJrTYtz/OI+gjNITEA1wjO55D9 sfM7KTIz+jvDzORv1h2iANdMxsCcdmpGhM2YcbRXuO/mfziPgRmJA7Q6vp1ZknfFwn8L p25mAN+DezXkvCrkNXmCDjtaNBaNyeTRx2JuL/nyrWwOMpfT9zNg2FqNg3Kt+v6kqJwg JCh7iXZ/gyPBU1cQC/jwFUxNaj1Ha1FcANfMYhOfZW/5i1x1qGZhVMEdJPk4xRnO4vgq AYPQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=ofRCS6qK; dkim=neutral (no key) header.i=@suse.de header.b="hrJU/N1u"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id k12si17746847pgq.733.2022.02.21.08.13.08; Mon, 21 Feb 2022 08:13:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=ofRCS6qK; dkim=neutral (no key) header.i=@suse.de header.b="hrJU/N1u"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1357643AbiBUMO4 (ORCPT + 99 others); Mon, 21 Feb 2022 07:14:56 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:42148 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1357612AbiBUMOJ (ORCPT ); Mon, 21 Feb 2022 07:14:09 -0500 Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 95E7420F6B; Mon, 21 Feb 2022 04:11:19 -0800 (PST) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 4E00721138; Mon, 21 Feb 2022 12:11:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1645445478; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=4WSAO4KoAjJN30nEtBuKVSDbAprmPqyfN2R4/SBnjpI=; b=ofRCS6qKDoWg7EEMqQ5Z4wG6cGl7a9FUSQqS1mRtA5JEKE/rWIAL5zmciJe5QsUsn3Td85 Lz+keTKhmrKlZkMQgv4q+59SMWK7Nk5KAOXUL7I5AlSddAFe+n9wjP4QpX8vkpZz26DwK7 IW6eZHwNZajN2e5dzom2qaYp3wff8nk= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1645445478; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=4WSAO4KoAjJN30nEtBuKVSDbAprmPqyfN2R4/SBnjpI=; b=hrJU/N1uL6K7GjJ/0SanKtKOB807HboFScHCfeO3B485ySs8dbhlq7Fhp1uQvvoAuLiVEO zvjMRRGKKCS+hWBg== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 388A413A9C; Mon, 21 Feb 2022 12:11:18 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id jX2GDGaBE2JzWwAAMHmgww (envelope-from ); Mon, 21 Feb 2022 12:11:18 +0000 From: Nicolai Stange To: Herbert Xu , "David S. Miller" Cc: =?UTF-8?q?Stephan=20M=C3=BCller?= , Hannes Reinecke , Torsten Duwe , David Howells , Jarkko Sakkinen , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, keyrings@vger.kernel.org, Nicolai Stange Subject: [PATCH v4 04/15] crypto: dh - constify struct dh's pointer members Date: Mon, 21 Feb 2022 13:10:50 +0100 Message-Id: <20220221121101.1615-5-nstange@suse.de> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20220221121101.1615-1-nstange@suse.de> References: <20220221121101.1615-1-nstange@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org struct dh contains several pointer members corresponding to DH parameters: ->key, ->p and ->g. A subsequent commit will introduce "dh" wrapping templates of the form "ffdhe2048(dh)", "ffdhe3072(dh)" and so on in order to provide built-in support for the well-known safe-prime ffdhe group parameters specified in RFC 7919. These templates will need to set the group parameter related members of the (serialized) struct dh instance passed to the inner "dh" kpp_alg instance, i.e. ->p and ->g, to some constant, static storage arrays. Turn the struct dh pointer members' types into "pointer to const" in preparation for this. Signed-off-by: Nicolai Stange --- include/crypto/dh.h | 6 +++--- security/keys/dh.c | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/include/crypto/dh.h b/include/crypto/dh.h index 2585f0e6bb69..67f3f6bca527 100644 --- a/include/crypto/dh.h +++ b/include/crypto/dh.h @@ -30,9 +30,9 @@ * @g_size: Size of DH generator G */ struct dh { - void *key; - void *p; - void *g; + const void *key; + const void *p; + const void *g; unsigned int key_size; unsigned int p_size; unsigned int g_size; diff --git a/security/keys/dh.c b/security/keys/dh.c index 4573fc15617d..b339760a31dd 100644 --- a/security/keys/dh.c +++ b/security/keys/dh.c @@ -15,7 +15,7 @@ #include #include "internal.h" -static ssize_t dh_data_from_key(key_serial_t keyid, void **data) +static ssize_t dh_data_from_key(key_serial_t keyid, const void **data) { struct key *key; key_ref_t key_ref; -- 2.26.2