1 From 59bcb169c4777bb3b1a50fee2ae20e4e8574b749 Mon Sep 17 00:00:00 2001
2 From: Daiki Ueno <dueno@src.gnome.org>
3 Date: Tue, 14 Jan 2020 10:09:29 +0100
4 Subject: [PATCH] secret-file-collection: Rename internal functions to avoid
7 As encrypt() is a standard POSIX function, its declaration had
8 conflict with our own. Let's be more verbose about naming of the
9 internal crypto functions.
13 Upstream-Status: Backport [https://github.com/GNOME/libsecret/commit/cf21ad50b62f7c8e4b22ef374f0a73290a99bdb8]
14 Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
16 libsecret/secret-file-collection.c | 38 +++++++++++++++---------------
17 1 file changed, 19 insertions(+), 19 deletions(-)
19 diff --git a/libsecret/secret-file-collection.c b/libsecret/secret-file-collection.c
20 index 79863ea..8ffb542 100644
21 --- a/libsecret/secret-file-collection.c
22 +++ b/libsecret/secret-file-collection.c
23 @@ -68,7 +68,7 @@ enum {
27 -derive (SecretFileCollection *self)
28 +do_derive_key (SecretFileCollection *self)
30 const gchar *password;
32 @@ -93,9 +93,9 @@ derive (SecretFileCollection *self)
36 -calculate_mac (SecretFileCollection *self,
37 - const guint8 *value, gsize n_value,
39 +do_calculate_mac (SecretFileCollection *self,
40 + const guint8 *value, gsize n_value,
45 @@ -130,9 +130,9 @@ calculate_mac (SecretFileCollection *self,
49 -decrypt (SecretFileCollection *self,
52 +do_decrypt (SecretFileCollection *self,
58 @@ -164,9 +164,9 @@ decrypt (SecretFileCollection *self,
62 -encrypt (SecretFileCollection *self,
65 +do_encrypt (SecretFileCollection *self,
71 @@ -311,7 +311,7 @@ on_load_contents (GObject *source_object,
72 self->modified = g_date_time_new_now_utc ();
73 self->usage_count = 0;
75 - if (!derive (self)) {
76 + if (!do_derive_key (self)) {
77 g_task_return_new_error (task,
79 SECRET_ERROR_PROTOCOL,
80 @@ -375,7 +375,7 @@ on_load_contents (GObject *source_object,
81 g_assert (n_data == salt_size);
83 self->salt = g_bytes_new (data, n_data);
84 - if (!derive (self)) {
85 + if (!do_derive_key (self)) {
86 g_task_return_new_error (task,
88 SECRET_ERROR_PROTOCOL,
89 @@ -442,7 +442,7 @@ hash_attributes (SecretFileCollection *self,
92 value = g_hash_table_lookup (attributes, l->data);
93 - if (!calculate_mac (self, (guint8 *)value, strlen (value), buffer)) {
94 + if (!do_calculate_mac (self, (guint8 *)value, strlen (value), buffer)) {
98 @@ -485,7 +485,7 @@ hashed_attributes_match (SecretFileCollection *self,
102 - if (!calculate_mac (self, value, strlen ((char *)value), buffer)) {
103 + if (!do_calculate_mac (self, value, strlen ((char *)value), buffer)) {
104 g_variant_unref (hashed_attribute);
107 @@ -584,7 +584,7 @@ secret_file_collection_replace (SecretFileCollection *self,
108 g_variant_store (serialized_item, data);
109 g_variant_unref (serialized_item);
110 memset (data + n_data, n_padded - n_data, n_padded - n_data);
111 - if (!encrypt (self, data, n_padded)) {
112 + if (!do_encrypt (self, data, n_padded)) {
113 egg_secure_free (data);
116 @@ -593,8 +593,8 @@ secret_file_collection_replace (SecretFileCollection *self,
120 - if (!calculate_mac (self, data, n_padded + IV_SIZE,
121 - data + n_padded + IV_SIZE)) {
122 + if (!do_calculate_mac (self, data, n_padded + IV_SIZE,
123 + data + n_padded + IV_SIZE)) {
124 egg_secure_free (data);
127 @@ -681,7 +681,7 @@ _secret_file_item_decrypt (GVariant *encrypted,
129 n_padded -= IV_SIZE + MAC_SIZE;
131 - if (!calculate_mac (collection, data, n_padded + IV_SIZE, mac)) {
132 + if (!do_calculate_mac (collection, data, n_padded + IV_SIZE, mac)) {
133 egg_secure_free (data);
136 @@ -699,7 +699,7 @@ _secret_file_item_decrypt (GVariant *encrypted,
140 - if (!decrypt (collection, data, n_padded)) {
141 + if (!do_decrypt (collection, data, n_padded)) {
142 egg_secure_free (data);