summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorThomas Haller <thaller@redhat.com>2019-03-02 17:10:25 +0100
committerThomas Haller <thaller@redhat.com>2019-03-07 17:54:25 +0100
commite46ba0186720bfe5e31dcad9a5001a415deb9ce6 (patch)
treefa4c1bd77f89b4629bde20968827f4108365f377 /src
parentf3ac8c6fe83a18c99fbbd32100924402a360e16e (diff)
downloadNetworkManager-e46ba0186720bfe5e31dcad9a5001a415deb9ce6.tar.gz
libnm: rename and expose nm_utils_base64secret_decode() in libnm
A NetworkManager client requires an API to validate and decode a base64 secret -- like it is used by WireGuard. If we don't have this as part of the API, it's inconvenient. Expose it. Rename it from _nm_utils_wireguard_decode_key(), to give it a more general name. Also, rename _nm_utils_wireguard_normalize_key() to nm_utils_base64secret_normalize(). But this one we keep as internal API. The user will care more about validating and decoding the base64 key. To convert the key back to base64, we don't need a public API in libnm. This is another ABI change since 1.16-rc1.
Diffstat (limited to 'src')
-rw-r--r--src/devices/nm-device-wireguard.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/src/devices/nm-device-wireguard.c b/src/devices/nm-device-wireguard.c
index 34fe1e1fff..ab30cd3174 100644
--- a/src/devices/nm-device-wireguard.c
+++ b/src/devices/nm-device-wireguard.c
@@ -729,9 +729,9 @@ _peers_get_platform_list (NMDeviceWireGuardPrivate *priv,
NMPWireGuardPeer *plp = &plpeers[i_good];
NMSettingSecretFlags psk_secret_flags;
- if (!_nm_utils_wireguard_decode_key (nm_wireguard_peer_get_public_key (peer_data->peer),
- sizeof (plp->public_key),
- plp->public_key))
+ if (!nm_utils_base64secret_decode (nm_wireguard_peer_get_public_key (peer_data->peer),
+ sizeof (plp->public_key),
+ plp->public_key))
continue;
*plf = NM_PLATFORM_WIREGUARD_CHANGE_PEER_FLAG_NONE;
@@ -754,9 +754,9 @@ _peers_get_platform_list (NMDeviceWireGuardPrivate *priv,
LINK_CONFIG_MODE_REAPPLY)) {
psk_secret_flags = nm_wireguard_peer_get_preshared_key_flags (peer_data->peer);
if (!NM_FLAGS_HAS (psk_secret_flags, NM_SETTING_SECRET_FLAG_NOT_REQUIRED)) {
- if ( !_nm_utils_wireguard_decode_key (nm_wireguard_peer_get_preshared_key (peer_data->peer),
- sizeof (plp->preshared_key),
- plp->preshared_key)
+ if ( !nm_utils_base64secret_decode (nm_wireguard_peer_get_preshared_key (peer_data->peer),
+ sizeof (plp->preshared_key),
+ plp->preshared_key)
&& config_mode == LINK_CONFIG_MODE_FULL)
goto skip;
}
@@ -1128,9 +1128,9 @@ link_config (NMDeviceWireGuard *self,
wg_lnk.fwmark = nm_setting_wireguard_get_fwmark (s_wg),
wg_change_flags |= NM_PLATFORM_WIREGUARD_CHANGE_FLAG_HAS_FWMARK;
- if (_nm_utils_wireguard_decode_key (nm_setting_wireguard_get_private_key (s_wg),
- sizeof (wg_lnk.private_key),
- wg_lnk.private_key)) {
+ if (nm_utils_base64secret_decode (nm_setting_wireguard_get_private_key (s_wg),
+ sizeof (wg_lnk.private_key),
+ wg_lnk.private_key)) {
wg_lnk_clear_private_key = NM_SECRET_PTR_ARRAY (wg_lnk.private_key);
wg_change_flags |= NM_PLATFORM_WIREGUARD_CHANGE_FLAG_HAS_PRIVATE_KEY;
} else {