Skip to content

Commit 281c632

Browse files
alexandearrolandshoemaker
authored andcommitted
crypto/x509/internal/macos: standardize package name
Rename "macOS" to "macos". Change-Id: I33ca7afaa14c910a97a19ead518894fb4917662c Reviewed-on: https://go-review.googlesource.com/c/go/+/688695 Reviewed-by: Michael Knyszek <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]> Reviewed-by: Mark Freeman <[email protected]> Reviewed-by: Daniel McCarney <[email protected]> Reviewed-by: Roland Shoemaker <[email protected]>
1 parent 61dc7fe commit 281c632

File tree

3 files changed

+30
-30
lines changed

3 files changed

+30
-30
lines changed

src/crypto/x509/internal/macos/corefoundation.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@
44

55
//go:build darwin
66

7-
// Package macOS provides cgo-less wrappers for Core Foundation and
7+
// Package macos provides cgo-less wrappers for Core Foundation and
88
// Security.framework, similarly to how package syscall provides access to
99
// libSystem.dylib.
10-
package macOS
10+
package macos
1111

1212
import (
1313
"bytes"

src/crypto/x509/internal/macos/security.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
//go:build darwin
66

7-
package macOS
7+
package macos
88

99
import (
1010
"errors"

src/crypto/x509/root_darwin.go

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -5,51 +5,51 @@
55
package x509
66

77
import (
8-
macOS "crypto/x509/internal/macos"
8+
"crypto/x509/internal/macos"
99
"errors"
1010
"fmt"
1111
)
1212

1313
func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
14-
certs := macOS.CFArrayCreateMutable()
15-
defer macOS.ReleaseCFArray(certs)
16-
leaf, err := macOS.SecCertificateCreateWithData(c.Raw)
14+
certs := macos.CFArrayCreateMutable()
15+
defer macos.ReleaseCFArray(certs)
16+
leaf, err := macos.SecCertificateCreateWithData(c.Raw)
1717
if err != nil {
1818
return nil, errors.New("invalid leaf certificate")
1919
}
20-
macOS.CFArrayAppendValue(certs, leaf)
20+
macos.CFArrayAppendValue(certs, leaf)
2121
if opts.Intermediates != nil {
2222
for _, lc := range opts.Intermediates.lazyCerts {
2323
c, err := lc.getCert()
2424
if err != nil {
2525
return nil, err
2626
}
27-
sc, err := macOS.SecCertificateCreateWithData(c.Raw)
27+
sc, err := macos.SecCertificateCreateWithData(c.Raw)
2828
if err != nil {
2929
return nil, err
3030
}
31-
macOS.CFArrayAppendValue(certs, sc)
31+
macos.CFArrayAppendValue(certs, sc)
3232
}
3333
}
3434

35-
policies := macOS.CFArrayCreateMutable()
36-
defer macOS.ReleaseCFArray(policies)
37-
sslPolicy, err := macOS.SecPolicyCreateSSL(opts.DNSName)
35+
policies := macos.CFArrayCreateMutable()
36+
defer macos.ReleaseCFArray(policies)
37+
sslPolicy, err := macos.SecPolicyCreateSSL(opts.DNSName)
3838
if err != nil {
3939
return nil, err
4040
}
41-
macOS.CFArrayAppendValue(policies, sslPolicy)
41+
macos.CFArrayAppendValue(policies, sslPolicy)
4242

43-
trustObj, err := macOS.SecTrustCreateWithCertificates(certs, policies)
43+
trustObj, err := macos.SecTrustCreateWithCertificates(certs, policies)
4444
if err != nil {
4545
return nil, err
4646
}
47-
defer macOS.CFRelease(trustObj)
47+
defer macos.CFRelease(trustObj)
4848

4949
if !opts.CurrentTime.IsZero() {
50-
dateRef := macOS.TimeToCFDateRef(opts.CurrentTime)
51-
defer macOS.CFRelease(dateRef)
52-
if err := macOS.SecTrustSetVerifyDate(trustObj, dateRef); err != nil {
50+
dateRef := macos.TimeToCFDateRef(opts.CurrentTime)
51+
defer macos.CFRelease(dateRef)
52+
if err := macos.SecTrustSetVerifyDate(trustObj, dateRef); err != nil {
5353
return nil, err
5454
}
5555
}
@@ -59,27 +59,27 @@ func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate
5959
// always enforce its SCT requirements, and there are still _some_ people
6060
// using TLS or OCSP for that.
6161

62-
if ret, err := macOS.SecTrustEvaluateWithError(trustObj); err != nil {
62+
if ret, err := macos.SecTrustEvaluateWithError(trustObj); err != nil {
6363
switch ret {
64-
case macOS.ErrSecCertificateExpired:
64+
case macos.ErrSecCertificateExpired:
6565
return nil, CertificateInvalidError{c, Expired, err.Error()}
66-
case macOS.ErrSecHostNameMismatch:
66+
case macos.ErrSecHostNameMismatch:
6767
return nil, HostnameError{c, opts.DNSName}
68-
case macOS.ErrSecNotTrusted:
68+
case macos.ErrSecNotTrusted:
6969
return nil, UnknownAuthorityError{Cert: c}
7070
default:
7171
return nil, fmt.Errorf("x509: %s", err)
7272
}
7373
}
7474

7575
chain := [][]*Certificate{{}}
76-
chainRef, err := macOS.SecTrustCopyCertificateChain(trustObj)
76+
chainRef, err := macos.SecTrustCopyCertificateChain(trustObj)
7777
if err != nil {
7878
return nil, err
7979
}
80-
defer macOS.CFRelease(chainRef)
81-
for i := 0; i < macOS.CFArrayGetCount(chainRef); i++ {
82-
certRef := macOS.CFArrayGetValueAtIndex(chainRef, i)
80+
defer macos.CFRelease(chainRef)
81+
for i := 0; i < macos.CFArrayGetCount(chainRef); i++ {
82+
certRef := macos.CFArrayGetValueAtIndex(chainRef, i)
8383
cert, err := exportCertificate(certRef)
8484
if err != nil {
8585
return nil, err
@@ -88,7 +88,7 @@ func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate
8888
}
8989
if len(chain[0]) == 0 {
9090
// This should _never_ happen, but to be safe
91-
return nil, errors.New("x509: macOS certificate verification internal error")
91+
return nil, errors.New("x509: macos certificate verification internal error")
9292
}
9393

9494
if opts.DNSName != "" {
@@ -118,8 +118,8 @@ func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate
118118
}
119119

120120
// exportCertificate returns a *Certificate for a SecCertificateRef.
121-
func exportCertificate(cert macOS.CFRef) (*Certificate, error) {
122-
data, err := macOS.SecCertificateCopyData(cert)
121+
func exportCertificate(cert macos.CFRef) (*Certificate, error) {
122+
data, err := macos.SecCertificateCopyData(cert)
123123
if err != nil {
124124
return nil, err
125125
}

0 commit comments

Comments
 (0)