Rename hmac_sha256() to ceph_hmac_sha256(), to avoid a naming conflict
with the upcoming hmac_sha256() library function.

This code will be able to use the HMAC-SHA256 library, but that's left
for a later commit.

Signed-off-by: Eric Biggers <ebigg...@kernel.org>
---
 net/ceph/messenger_v2.c | 12 ++++++------
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/net/ceph/messenger_v2.c b/net/ceph/messenger_v2.c
index bd608ffa06279..5483b4eed94e1 100644
--- a/net/ceph/messenger_v2.c
+++ b/net/ceph/messenger_v2.c
@@ -791,12 +791,12 @@ static int setup_crypto(struct ceph_connection *con,
               con_secret + CEPH_GCM_KEY_LEN + CEPH_GCM_IV_LEN,
               CEPH_GCM_IV_LEN);
        return 0;  /* auth_x, secure mode */
 }
 
-static int hmac_sha256(struct ceph_connection *con, const struct kvec *kvecs,
-                      int kvec_cnt, u8 *hmac)
+static int ceph_hmac_sha256(struct ceph_connection *con,
+                           const struct kvec *kvecs, int kvec_cnt, u8 *hmac)
 {
        SHASH_DESC_ON_STACK(desc, con->v2.hmac_tfm);  /* tfm arg is ignored */
        int ret;
        int i;
 
@@ -1460,12 +1460,12 @@ static int prepare_auth_signature(struct 
ceph_connection *con)
        buf = alloc_conn_buf(con, head_onwire_len(SHA256_DIGEST_SIZE,
                                                  con_secure(con)));
        if (!buf)
                return -ENOMEM;
 
-       ret = hmac_sha256(con, con->v2.in_sign_kvecs, con->v2.in_sign_kvec_cnt,
-                         CTRL_BODY(buf));
+       ret = ceph_hmac_sha256(con, con->v2.in_sign_kvecs,
+                              con->v2.in_sign_kvec_cnt, CTRL_BODY(buf));
        if (ret)
                return ret;
 
        return prepare_control(con, FRAME_TAG_AUTH_SIGNATURE, buf,
                               SHA256_DIGEST_SIZE);
@@ -2458,12 +2458,12 @@ static int process_auth_signature(struct 
ceph_connection *con,
        if (con->state != CEPH_CON_S_V2_AUTH_SIGNATURE) {
                con->error_msg = "protocol error, unexpected auth_signature";
                return -EINVAL;
        }
 
-       ret = hmac_sha256(con, con->v2.out_sign_kvecs,
-                         con->v2.out_sign_kvec_cnt, hmac);
+       ret = ceph_hmac_sha256(con, con->v2.out_sign_kvecs,
+                              con->v2.out_sign_kvec_cnt, hmac);
        if (ret)
                return ret;
 
        ceph_decode_need(&p, end, SHA256_DIGEST_SIZE, bad);
        if (crypto_memneq(p, hmac, SHA256_DIGEST_SIZE)) {
-- 
2.50.0


Reply via email to