Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp1705556pxb; Wed, 2 Feb 2022 10:37:53 -0800 (PST) X-Google-Smtp-Source: ABdhPJxKFqF5MKX3shIQ4B6SXmVvmCoSDBDdlehVV5/QZ3p/x4A0l9WtqLBh8n93dQ6WfJh+Amon X-Received: by 2002:a17:903:2283:: with SMTP id b3mr30838721plh.0.1643827072827; Wed, 02 Feb 2022 10:37:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643827072; cv=none; d=google.com; s=arc-20160816; b=sPYY3yyAGbccH2uAO028yxFos54NHL4jXAIxGLRA7rL4Z7sgz7F8FITgJafPvBbHqr LiDXJNLQV9IAlQ15DZnReLjvzW9DK9TLWfg6Pg7cxuSj6HvxjeD2dbW9UyLvbP/M+k/Y J4bl389EoB84AOQow1tCwMm2mzwBA25XRpAICwdRkH7s/LvTPPHOUh2wEYpITEe4e+U9 23bEPIb9UDHACx3KqensxFecycnM3NGlpnV2tjRcE1KOW4y3BYc11tL9a8ONDOINDUw2 HwKZ3GHTLJqs40B3TK4EEXBdS4qNE6BAn0deCkq7n52CyQcDGrNyPGedwTf7PUVXW430 ymfw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-signature; bh=4WSAO4KoAjJN30nEtBuKVSDbAprmPqyfN2R4/SBnjpI=; b=I24ycAIQHwRF60Sf97MU61VzmWBEswRS8cDBBAB5n29TdWVMZhNqi79qlLM3s7Uqm8 DUgPYi/oyRTSRsiYn8CrWzpi4Inp+Gh0/M0WHrusffqRICQsCI0DoZhTR31JDVyxra22 z+QmECVci5i/yh6f78Y9iUAFtEsb6dtab7ivnqLisBnkVGGKlC+VRkRqHt7Ywq2ocGOz KyFd4x/j+3lZwfuN2GMEee3r167wv3niBEnzlCNsPgVJUaWFIgcrdBZBwDHUqySZohfJ tw94vYXjpYSSXDFI7Vi6s7ejgd24a7CkGpmwyKDmoRJNCpTwVXHzuj1BEJgf3mLaggw8 1cLg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=1HE1xFDf; dkim=neutral (no key) header.i=@suse.de; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f127si19233421pgc.335.2022.02.02.10.37.33; Wed, 02 Feb 2022 10:37:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=1HE1xFDf; dkim=neutral (no key) header.i=@suse.de; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231247AbiBBKll (ORCPT + 99 others); Wed, 2 Feb 2022 05:41:41 -0500 Received: from smtp-out2.suse.de ([195.135.220.29]:36744 "EHLO smtp-out2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243490AbiBBKlf (ORCPT ); Wed, 2 Feb 2022 05:41:35 -0500 Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 783BB1F383; Wed, 2 Feb 2022 10:41:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1643798493; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=4WSAO4KoAjJN30nEtBuKVSDbAprmPqyfN2R4/SBnjpI=; b=1HE1xFDf8UqZhvphAYrHgCUwvX01n1bh9f3Ft+c/pkSzAU6V3DOLoeKkYaDgAaXCqnrhOz aeW4zzZj0wb8/IQJcq1HJ/61ushPSP1aklMulKL47QbzKE4zQYlv0DJ22Fs/gkwuLzylhM hHjwakd2bHJlaBeicT9LOzETiwmkdW4= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1643798493; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=4WSAO4KoAjJN30nEtBuKVSDbAprmPqyfN2R4/SBnjpI=; b=3Fn+iNLno4zkyOZvxFtUf/bkF/Vfb+V5gK9rGix1dTs2tZJ9AUxgQS3r4erQkyCqe6BzgL HHllsT+oN9juTeDg== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 64B6E13E02; Wed, 2 Feb 2022 10:41:33 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id s6J4F91f+mFtbAAAMHmgww (envelope-from ); Wed, 02 Feb 2022 10:41:33 +0000 From: Nicolai Stange To: Herbert Xu , "David S. Miller" Cc: =?UTF-8?q?Stephan=20M=C3=BCller?= , Hannes Reinecke , Torsten Duwe , David Howells , Jarkko Sakkinen , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, keyrings@vger.kernel.org, Nicolai Stange Subject: [PATCH v3 04/15] crypto: dh - constify struct dh's pointer members Date: Wed, 2 Feb 2022 11:40:01 +0100 Message-Id: <20220202104012.4193-5-nstange@suse.de> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20220202104012.4193-1-nstange@suse.de> References: <20220202104012.4193-1-nstange@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org struct dh contains several pointer members corresponding to DH parameters: ->key, ->p and ->g. A subsequent commit will introduce "dh" wrapping templates of the form "ffdhe2048(dh)", "ffdhe3072(dh)" and so on in order to provide built-in support for the well-known safe-prime ffdhe group parameters specified in RFC 7919. These templates will need to set the group parameter related members of the (serialized) struct dh instance passed to the inner "dh" kpp_alg instance, i.e. ->p and ->g, to some constant, static storage arrays. Turn the struct dh pointer members' types into "pointer to const" in preparation for this. Signed-off-by: Nicolai Stange --- include/crypto/dh.h | 6 +++--- security/keys/dh.c | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/include/crypto/dh.h b/include/crypto/dh.h index 2585f0e6bb69..67f3f6bca527 100644 --- a/include/crypto/dh.h +++ b/include/crypto/dh.h @@ -30,9 +30,9 @@ * @g_size: Size of DH generator G */ struct dh { - void *key; - void *p; - void *g; + const void *key; + const void *p; + const void *g; unsigned int key_size; unsigned int p_size; unsigned int g_size; diff --git a/security/keys/dh.c b/security/keys/dh.c index 4573fc15617d..b339760a31dd 100644 --- a/security/keys/dh.c +++ b/security/keys/dh.c @@ -15,7 +15,7 @@ #include #include "internal.h" -static ssize_t dh_data_from_key(key_serial_t keyid, void **data) +static ssize_t dh_data_from_key(key_serial_t keyid, const void **data) { struct key *key; key_ref_t key_ref; -- 2.26.2