[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <153779151491.28003.1935104275920340501.stgit@warthog.procyon.org.uk>
Date: Mon, 24 Sep 2018 13:18:34 +0100
From: David Howells <dhowells@...hat.com>
To: jmorris@...ei.org
Cc: Lubomir Rintel <lkundrak@...sk>,
Randy Dunlap <rdunlap@...radead.org>,
Mat Martineau <mathew.j.martineau@...ux.intel.com>,
Stephan Mueller <smueller@...onox.de>,
"Serge E. Hallyn" <serge@...lyn.com>,
Mat Martineau <mathew.j.martineau@...ux.intel.com>,
Andrew Morton <akpm@...ux-foundation.org>,
Linus Torvalds <torvalds@...ux-foundation.org>,
stable@...r.kernel.org, dhowells@...hat.com,
keyrings@...r.kernel.org, linux-security-module@...r.kernel.org,
lkundrak@...sk, rdunlap@...radead.org, linux-kernel@...r.kernel.org
Subject: [PATCH 1/2] Revert "uapi/linux/keyctl.h: don't use C++ reserved
keyword as a struct member name"
From: Lubomir Rintel <lkundrak@...sk>
This changes UAPI, breaking iwd and libell:
ell/key.c: In function 'kernel_dh_compute':
ell/key.c:205:38: error: 'struct keyctl_dh_params' has no member named 'private'; did you mean 'dh_private'?
struct keyctl_dh_params params = { .private = private,
^~~~~~~
dh_private
This reverts commit 8a2336e549d385bb0b46880435b411df8d8200e8.
Signed-off-by: Lubomir Rintel <lkundrak@...sk>
Signed-off-by: David Howells <dhowells@...hat.com>
cc: Randy Dunlap <rdunlap@...radead.org>
cc: Mat Martineau <mathew.j.martineau@...ux.intel.com>
cc: Stephan Mueller <smueller@...onox.de>
cc: James Morris <jmorris@...ei.org>
cc: "Serge E. Hallyn" <serge@...lyn.com>
cc: Mat Martineau <mathew.j.martineau@...ux.intel.com>
cc: Andrew Morton <akpm@...ux-foundation.org>
cc: Linus Torvalds <torvalds@...ux-foundation.org>
cc: <stable@...r.kernel.org>
---
include/uapi/linux/keyctl.h | 2 +-
security/keys/dh.c | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/include/uapi/linux/keyctl.h b/include/uapi/linux/keyctl.h
index 910cc4334b21..7b8c9e19bad1 100644
--- a/include/uapi/linux/keyctl.h
+++ b/include/uapi/linux/keyctl.h
@@ -65,7 +65,7 @@
/* keyctl structures */
struct keyctl_dh_params {
- __s32 dh_private;
+ __s32 private;
__s32 prime;
__s32 base;
};
diff --git a/security/keys/dh.c b/security/keys/dh.c
index 3b602a1e27fa..711e89d8c415 100644
--- a/security/keys/dh.c
+++ b/security/keys/dh.c
@@ -300,7 +300,7 @@ long __keyctl_dh_compute(struct keyctl_dh_params __user *params,
}
dh_inputs.g_size = dlen;
- dlen = dh_data_from_key(pcopy.dh_private, &dh_inputs.key);
+ dlen = dh_data_from_key(pcopy.private, &dh_inputs.key);
if (dlen < 0) {
ret = dlen;
goto out2;
Powered by blists - more mailing lists