Use unexported kdf const names

This commit is contained in:
Jeff Mitchell
2016-08-31 07:19:58 -04:00
parent 65ae080c82
commit 201cd2e1f7
4 changed files with 10 additions and 10 deletions

View File

@@ -565,8 +565,8 @@ func TestDerivedKeyUpgrade(t *testing.T) {
p.migrateKeyToKeysMap()
p.upgrade(storage) // Need to run the upgrade code to make the migration stick
if p.KDF != KDF_hmac_sha256_counter {
t.Fatalf("bad KDF value by default; counter val is %d, KDF val is %d, policy is %#v", KDF_hmac_sha256_counter, p.KDF, *p)
if p.KDF != kdf_hmac_sha256_counter {
t.Fatalf("bad KDF value by default; counter val is %d, KDF val is %d, policy is %#v", kdf_hmac_sha256_counter, p.KDF, *p)
}
derBytesOld, err := p.DeriveKey(context, 1)
@@ -583,7 +583,7 @@ func TestDerivedKeyUpgrade(t *testing.T) {
t.Fatal("mismatch of same context alg")
}
p.KDF = KDF_hkdf_sha256
p.KDF = kdf_hkdf_sha256
if p.needsUpgrade() {
t.Fatal("expected no upgrade needed")
}

View File

@@ -202,7 +202,7 @@ func (lm *lockManager) getPolicyCommon(storage logical.Storage, name string, ups
Derived: derived,
}
if derived {
p.KDF = KDF_hkdf_sha256
p.KDF = kdf_hkdf_sha256
p.ConvergentEncryption = convergent
p.ConvergentVersion = 2
}

View File

@@ -108,10 +108,10 @@ func (b *backend) pathPolicyRead(
}
if p.Derived {
switch p.KDF {
case KDF_hmac_sha256_counter:
case kdf_hmac_sha256_counter:
resp.Data["kdf"] = "hmac-sha256-counter"
resp.Data["kdf_mode"] = "hmac-sha256-counter"
case KDF_hkdf_sha256:
case kdf_hkdf_sha256:
resp.Data["kdf"] = "hkdf_sha256"
}
resp.Data["convergent_encryption"] = p.ConvergentEncryption

View File

@@ -25,8 +25,8 @@ import (
// Careful with iota; don't put anything before it in this const block
const (
KDF_hmac_sha256_counter = iota // built-in helper
KDF_hkdf_sha256 // golang.org/x/crypto/hkdf
kdf_hmac_sha256_counter = iota // built-in helper
kdf_hkdf_sha256 // golang.org/x/crypto/hkdf
)
const ErrTooOld = "ciphertext version is disallowed by policy (too old)"
@@ -342,11 +342,11 @@ func (p *Policy) DeriveKey(context []byte, ver int) ([]byte, error) {
}
switch p.KDF {
case KDF_hmac_sha256_counter:
case kdf_hmac_sha256_counter:
prf := kdf.HMACSHA256PRF
prfLen := kdf.HMACSHA256PRFLen
return kdf.CounterMode(prf, prfLen, p.Keys[ver].Key, context, 256)
case KDF_hkdf_sha256:
case kdf_hkdf_sha256:
reader := hkdf.New(sha256.New, p.Keys[ver].Key, nil, context)
derBytes := bytes.NewBuffer(nil)
derBytes.Grow(32)