Skip to content

Commit 47676da

Browse files
authored
fix:decapitalize parameters (#172)
1 parent 950c5fd commit 47676da

File tree

3 files changed

+27
-28
lines changed

3 files changed

+27
-28
lines changed

ecdsa.go

+10-10
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,8 @@ func (k *PublicKeyECDSA) withKey(f func(C.GO_EVP_PKEY_PTR) C.int) C.int {
4040

4141
var errUnknownCurve = errors.New("openssl: unknown elliptic curve")
4242

43-
func NewPublicKeyECDSA(curve string, X, Y BigInt) (*PublicKeyECDSA, error) {
44-
pkey, err := newECDSAKey(curve, X, Y, nil)
43+
func NewPublicKeyECDSA(curve string, x, y BigInt) (*PublicKeyECDSA, error) {
44+
pkey, err := newECDSAKey(curve, x, y, nil)
4545
if err != nil {
4646
return nil, err
4747
}
@@ -50,8 +50,8 @@ func NewPublicKeyECDSA(curve string, X, Y BigInt) (*PublicKeyECDSA, error) {
5050
return k, nil
5151
}
5252

53-
func NewPrivateKeyECDSA(curve string, X, Y, D BigInt) (*PrivateKeyECDSA, error) {
54-
pkey, err := newECDSAKey(curve, X, Y, D)
53+
func NewPrivateKeyECDSA(curve string, x, y, d BigInt) (*PrivateKeyECDSA, error) {
54+
pkey, err := newECDSAKey(curve, x, y, d)
5555
if err != nil {
5656
return nil, err
5757
}
@@ -60,7 +60,7 @@ func NewPrivateKeyECDSA(curve string, X, Y, D BigInt) (*PrivateKeyECDSA, error)
6060
return k, nil
6161
}
6262

63-
func GenerateKeyECDSA(curve string) (X, Y, D BigInt, err error) {
63+
func GenerateKeyECDSA(curve string) (x, y, d BigInt, err error) {
6464
// Generate the private key.
6565
pkey, err := generateEVPPKey(C.GO_EVP_PKEY_EC, 0, curve)
6666
if err != nil {
@@ -121,7 +121,7 @@ func HashVerifyECDSA(pub *PublicKeyECDSA, h crypto.Hash, msg, sig []byte) bool {
121121
return evpHashVerify(pub.withKey, h, msg, sig) == nil
122122
}
123123

124-
func newECDSAKey(curve string, X, Y, D BigInt) (C.GO_EVP_PKEY_PTR, error) {
124+
func newECDSAKey(curve string, x, y, d BigInt) (C.GO_EVP_PKEY_PTR, error) {
125125
nid, err := curveNID(curve)
126126
if err != nil {
127127
return nil, err
@@ -132,10 +132,10 @@ func newECDSAKey(curve string, X, Y, D BigInt) (C.GO_EVP_PKEY_PTR, error) {
132132
C.go_openssl_BN_free(by)
133133
C.go_openssl_BN_clear_free(bd)
134134
}()
135-
bx = bigToBN(X)
136-
by = bigToBN(Y)
137-
bd = bigToBN(D)
138-
if bx == nil || by == nil || (D != nil && bd == nil) {
135+
bx = bigToBN(x)
136+
by = bigToBN(y)
137+
bd = bigToBN(d)
138+
if bx == nil || by == nil || (d != nil && bd == nil) {
139139
return nil, newOpenSSLError("BN_lebin2bn failed")
140140
}
141141
switch vMajor {

hash_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -248,7 +248,7 @@ func TestHash_OneShot(t *testing.T) {
248248
h := cryptoToHash(tt.h)()
249249
h.Write(msg)
250250
want := h.Sum(nil)
251-
if !bytes.Equal(got[:], want) {
251+
if !bytes.Equal(got, want) {
252252
t.Errorf("got:%x want:%x", got, want)
253253
}
254254
})

rsa.go

+16-17
Original file line numberDiff line numberDiff line change
@@ -94,15 +94,15 @@ type PublicKeyRSA struct {
9494
_pkey C.GO_EVP_PKEY_PTR
9595
}
9696

97-
func NewPublicKeyRSA(N, E BigInt) (*PublicKeyRSA, error) {
97+
func NewPublicKeyRSA(n, e BigInt) (*PublicKeyRSA, error) {
9898
var pkey C.GO_EVP_PKEY_PTR
9999
switch vMajor {
100100
case 1:
101101
key := C.go_openssl_RSA_new()
102102
if key == nil {
103103
return nil, newOpenSSLError("RSA_new failed")
104104
}
105-
if !rsaSetKey(key, N, E, nil) {
105+
if !rsaSetKey(key, n, e, nil) {
106106
return nil, fail("RSA_set0_key")
107107
}
108108
pkey = C.go_openssl_EVP_PKEY_new()
@@ -117,7 +117,7 @@ func NewPublicKeyRSA(N, E BigInt) (*PublicKeyRSA, error) {
117117
}
118118
case 3:
119119
var err error
120-
if pkey, err = newRSAKey3(false, N, E, nil, nil, nil, nil, nil, nil); err != nil {
120+
if pkey, err = newRSAKey3(false, n, e, nil, nil, nil, nil, nil, nil); err != nil {
121121
return nil, err
122122
}
123123
default:
@@ -145,24 +145,24 @@ type PrivateKeyRSA struct {
145145
_pkey C.GO_EVP_PKEY_PTR
146146
}
147147

148-
func NewPrivateKeyRSA(N, E, D, P, Q, Dp, Dq, Qinv BigInt) (*PrivateKeyRSA, error) {
148+
func NewPrivateKeyRSA(n, e, d, p, q, dp, dq, qinv BigInt) (*PrivateKeyRSA, error) {
149149
var pkey C.GO_EVP_PKEY_PTR
150150
switch vMajor {
151151
case 1:
152152
key := C.go_openssl_RSA_new()
153153
if key == nil {
154154
return nil, newOpenSSLError("RSA_new failed")
155155
}
156-
if !rsaSetKey(key, N, E, D) {
156+
if !rsaSetKey(key, n, e, d) {
157157
return nil, fail("RSA_set0_key")
158158
}
159-
if P != nil && Q != nil {
160-
if !rsaSetFactors(key, P, Q) {
159+
if p != nil && q != nil {
160+
if !rsaSetFactors(key, p, q) {
161161
return nil, fail("RSA_set0_factors")
162162
}
163163
}
164-
if Dp != nil && Dq != nil && Qinv != nil {
165-
if !rsaSetCRTParams(key, Dp, Dq, Qinv) {
164+
if dp != nil && dq != nil && qinv != nil {
165+
if !rsaSetCRTParams(key, dp, dq, qinv) {
166166
return nil, fail("RSA_set0_crt_params")
167167
}
168168
}
@@ -178,7 +178,7 @@ func NewPrivateKeyRSA(N, E, D, P, Q, Dp, Dq, Qinv BigInt) (*PrivateKeyRSA, error
178178
}
179179
case 3:
180180
var err error
181-
if pkey, err = newRSAKey3(true, N, E, D, P, Q, Dp, Dq, Qinv); err != nil {
181+
if pkey, err = newRSAKey3(true, n, e, d, p, q, dp, dq, qinv); err != nil {
182182
return nil, err
183183
}
184184
default:
@@ -334,7 +334,7 @@ func bnSet(b1 *C.GO_BIGNUM_PTR, b2 BigInt) {
334334
func rsaSetKey(key C.GO_RSA_PTR, n, e, d BigInt) bool {
335335
if vMajor == 1 && vMinor == 0 {
336336
r := (*rsa_st_1_0_2)(unsafe.Pointer(key))
337-
//r.d and d will be nil for public keys.
337+
// r.d and d will be nil for public keys.
338338
if (r.n == nil && n == nil) ||
339339
(r.e == nil && e == nil) {
340340
return false
@@ -376,8 +376,7 @@ func rsaSetCRTParams(key C.GO_RSA_PTR, dmp1, dmq1, iqmp BigInt) bool {
376376
}
377377
return C.go_openssl_RSA_set0_crt_params(key, bigToBN(dmp1), bigToBN(dmq1), bigToBN(iqmp)) == 1
378378
}
379-
380-
func newRSAKey3(isPriv bool, N, E, D, P, Q, Dp, Dq, Qinv BigInt) (C.GO_EVP_PKEY_PTR, error) {
379+
func newRSAKey3(isPriv bool, n, e, d, p, q, dp, dq, qinv BigInt) (C.GO_EVP_PKEY_PTR, error) {
381380
// Construct the parameters.
382381
bld := C.go_openssl_OSSL_PARAM_BLD_new()
383382
if bld == nil {
@@ -393,17 +392,17 @@ func newRSAKey3(isPriv bool, N, E, D, P, Q, Dp, Dq, Qinv BigInt) (C.GO_EVP_PKEY_
393392
comps := make([]bigIntParam, 0, 8)
394393

395394
required := [...]bigIntParam{
396-
{OSSL_PKEY_PARAM_RSA_N, N}, {OSSL_PKEY_PARAM_RSA_E, E}, {OSSL_PKEY_PARAM_RSA_D, D},
395+
{OSSL_PKEY_PARAM_RSA_N, n}, {OSSL_PKEY_PARAM_RSA_E, e}, {OSSL_PKEY_PARAM_RSA_D, d},
397396
}
398397
comps = append(comps, required[:]...)
399398

400399
// OpenSSL 3.0 and 3.1 required all the precomputed values if
401400
// P and Q are present. See:
402401
// https://github.com/openssl/openssl/pull/22334
403-
if P != nil && Q != nil && Dp != nil && Dq != nil && Qinv != nil {
402+
if p != nil && q != nil && dp != nil && dq != nil && qinv != nil {
404403
precomputed := [...]bigIntParam{
405-
{OSSL_PKEY_PARAM_RSA_FACTOR1, P}, {OSSL_PKEY_PARAM_RSA_FACTOR2, Q},
406-
{OSSL_PKEY_PARAM_RSA_EXPONENT1, Dp}, {OSSL_PKEY_PARAM_RSA_EXPONENT2, Dq}, {OSSL_PKEY_PARAM_RSA_COEFFICIENT1, Qinv},
404+
{OSSL_PKEY_PARAM_RSA_FACTOR1, p}, {OSSL_PKEY_PARAM_RSA_FACTOR2, q},
405+
{OSSL_PKEY_PARAM_RSA_EXPONENT1, dp}, {OSSL_PKEY_PARAM_RSA_EXPONENT2, dq}, {OSSL_PKEY_PARAM_RSA_COEFFICIENT1, qinv},
407406
}
408407
comps = append(comps, precomputed[:]...)
409408
}

0 commit comments

Comments
 (0)