Skip to content

Commit ed9140d

Browse files
committed
feat: rename Discriminant to Algorithm
1 parent 68e0d91 commit ed9140d

File tree

13 files changed

+53
-53
lines changed

13 files changed

+53
-53
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,13 +23,13 @@ func ExampleDecode() {
2323
handleErr(err)
2424

2525
fmt.Printf("%T\n", vs)
26-
fmt.Printf("Discriminator: %d\n", vs.Discriminator())
26+
fmt.Printf("Algorithm: %d\n", vs.Algorithm())
2727
fmt.Printf("Hash: %d\n", vs.Hash())
2828
fmt.Printf("PayloadEncoding: %d\n", vs.PayloadEncoding())
2929

3030
// Output:
3131
// varsig.EdDSAVarsig
32-
// Discriminator: 237
32+
// Algorithm: 237
3333
// Hash: 19
3434
// PayloadEncoding: 3
3535
}

common_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ func TestRoundTrip(t *testing.T) {
115115
require.NoError(t, err)
116116

117117
require.Equal(t, tc.varsig.Version(), rt.Version())
118-
require.Equal(t, tc.varsig.Discriminator(), rt.Discriminator())
118+
require.Equal(t, tc.varsig.Algorithm(), rt.Algorithm())
119119
require.Equal(t, tc.varsig.PayloadEncoding(), rt.PayloadEncoding())
120120

121121
switch vs := tc.varsig.(type) {

constant.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -173,14 +173,14 @@ func EncodePayloadEncoding(enc PayloadEncoding) []byte {
173173
return res
174174
}
175175

176-
// Discriminator is (usually) the value representing the public key type of
176+
// Algorithm is (usually) the value representing the public key type of
177177
// the algorithm used to create the signature.
178178
//
179179
// There is no set list of constants here, nor is there a decode function
180180
// as the author of an implementation should include the constant with the
181181
// implementation, and the decoding is handled by the Handler, which uses
182-
// the Discriminator to choose the correct implementation. Also note that
183-
// some of the Discriminator values for a specific implementation have
182+
// the Algorithm to choose the correct implementation. Also note that
183+
// some of the Algorithm values for a specific implementation have
184184
// changed between varsig v0 and v1, so it's possible to have more than one
185185
// constant defined per implementation.
186-
type Discriminator uint64
186+
type Algorithm uint64

ecdsa.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ import (
55
"fmt"
66
)
77

8-
// DiscriminatorECDSA is the value specifying an ECDSA signature.
9-
const DiscriminatorECDSA = Discriminator(0xec)
8+
// AlgorithmECDSA is the value specifying an ECDSA signature.
9+
const AlgorithmECDSA = Algorithm(0xec)
1010

1111
// ECDSACurve are values that specify which ECDSA curve is used when
1212
// generating the signature.
@@ -51,7 +51,7 @@ type ECDSAVarsig struct {
5151
func NewECDSAVarsig(curve ECDSACurve, hashAlgorithm Hash, payloadEncoding PayloadEncoding) ECDSAVarsig {
5252
return ECDSAVarsig{
5353
varsig: varsig{
54-
disc: DiscriminatorECDSA,
54+
algo: AlgorithmECDSA,
5555
payEnc: payloadEncoding,
5656
},
5757
curve: curve,

eddsa.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ import (
55
"fmt"
66
)
77

8-
// DiscriminatorEdDSA is the value specifying an EdDSA signature.
9-
const DiscriminatorEdDSA = Discriminator(0xed)
8+
// AlgorithmEdDSA is the value specifying an EdDSA signature.
9+
const AlgorithmEdDSA = Algorithm(0xed)
1010

1111
// EdDSACurve are values that specify which Edwards curve is used when
1212
// generating the signature.
@@ -49,7 +49,7 @@ type EdDSAVarsig struct {
4949
func NewEdDSAVarsig(curve EdDSACurve, hashAlgorithm Hash, payloadEncoding PayloadEncoding) EdDSAVarsig {
5050
return EdDSAVarsig{
5151
varsig: varsig{
52-
disc: DiscriminatorEdDSA,
52+
algo: AlgorithmEdDSA,
5353
payEnc: payloadEncoding,
5454
},
5555
curve: curve,

eddsa_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ func TestUCANExampleV1(t *testing.T) {
2929
require.True(t, ok)
3030

3131
assert.Equal(t, varsig.Version1, ed25519V.Version())
32-
assert.Equal(t, varsig.DiscriminatorEdDSA, ed25519V.Discriminator())
32+
assert.Equal(t, varsig.AlgorithmEdDSA, ed25519V.Algorithm())
3333
assert.Equal(t, varsig.CurveEd25519, ed25519V.Curve())
3434
assert.Equal(t, varsig.HashSha2_512, ed25519V.Hash())
3535
assert.Equal(t, varsig.PayloadEncodingDAGCBOR, ed25519V.PayloadEncoding())

error.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ var ErrUnknownHash = errors.New("unknown hash algorithm")
1616
// for this field may vary based on the varsig version.
1717
var ErrUnsupportedPayloadEncoding = errors.New("unsupported payload encoding")
1818

19-
// ErrUnknownDiscriminator is returned when the Registry doesn't have a
19+
// ErrUnknownAlgorithm is returned when the Registry doesn't have a
2020
// parsing function for the decoded signing algorithm.
21-
var ErrUnknownDiscriminator = errors.New("unknown signing algorithm")
21+
var ErrUnknownAlgorithm = errors.New("unknown signing algorithm")
2222

2323
// ErrUnknownEdDSACurve is returned when the decoded uvarint isn't either
2424
// CurveEd25519 or CurveEd448.

registry.go

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -22,15 +22,15 @@ type DecodeFunc func(BytesReader) (Varsig, error)
2222

2323
// Registry contains a mapping between known signing algorithms and
2424
// functions that can parse varsigs for that signing algorithm.
25-
type Registry map[Discriminator]DecodeFunc
25+
type Registry map[Algorithm]DecodeFunc
2626

2727
// DefaultRegistry provides a Registry containing the mappings for the
2828
// signing algorithms which have an implementation within this library.
2929
func DefaultRegistry() Registry {
30-
return map[Discriminator]DecodeFunc{
31-
DiscriminatorRSA: decodeRSA,
32-
DiscriminatorEdDSA: decodeEdDSA,
33-
DiscriminatorECDSA: decodeECDSA,
30+
return map[Algorithm]DecodeFunc{
31+
AlgorithmRSA: decodeRSA,
32+
AlgorithmEdDSA: decodeEdDSA,
33+
AlgorithmECDSA: decodeECDSA,
3434
}
3535
}
3636

@@ -41,7 +41,7 @@ func NewRegistry() Registry {
4141

4242
// Register allows new mappings between a signing algorithm and its parsing
4343
// function to the Registry.
44-
func (rs Registry) Register(alg Discriminator, decodeFunc DecodeFunc) {
44+
func (rs Registry) Register(alg Algorithm, decodeFunc DecodeFunc) {
4545
rs[alg] = decodeFunc
4646
}
4747

@@ -63,7 +63,7 @@ func (rs Registry) DecodeStream(r BytesReader) (Varsig, error) {
6363
return nil, fmt.Errorf("%w: expected %d, got %d", ErrBadPrefix, Prefix, pre)
6464
}
6565

66-
vers, disc, err := rs.decodeVersAnddisc(r)
66+
vers, algo, err := rs.decodeVersAndAlgo(r)
6767
if err != nil {
6868
return nil, err
6969
}
@@ -72,15 +72,15 @@ func (rs Registry) DecodeStream(r BytesReader) (Varsig, error) {
7272
return nil, fmt.Errorf("%w: %d", ErrUnsupportedVersion, vers)
7373
}
7474

75-
decodeFunc, ok := rs[Discriminator(disc)]
75+
decodeFunc, ok := rs[Algorithm(algo)]
7676
if !ok {
77-
return nil, fmt.Errorf("%w: %x", ErrUnknownDiscriminator, disc)
77+
return nil, fmt.Errorf("%w: %x", ErrUnknownAlgorithm, algo)
7878
}
7979

8080
return decodeFunc(r)
8181
}
8282

83-
func (rs Registry) decodeVersAnddisc(r BytesReader) (Version, Discriminator, error) {
83+
func (rs Registry) decodeVersAndAlgo(r BytesReader) (Version, Algorithm, error) {
8484
vers, err := binary.ReadUvarint(r)
8585
if err != nil {
8686
return Version(vers), 0, err
@@ -91,10 +91,10 @@ func (rs Registry) decodeVersAnddisc(r BytesReader) (Version, Discriminator, err
9191
}
9292

9393
if vers >= 64 {
94-
return 0, Discriminator(vers), nil
94+
return 0, Algorithm(vers), nil
9595
}
9696

97-
disc, err := binary.ReadUvarint(r)
97+
algo, err := binary.ReadUvarint(r)
9898

99-
return Version(vers), Discriminator(disc), err
99+
return Version(vers), Algorithm(algo), err
100100
}

registry_test.go

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -21,44 +21,44 @@ func TestRegistry_Decode(t *testing.T) {
2121
vs, err := reg.DecodeStream(bytes.NewReader(data))
2222
require.NoError(t, err)
2323
assert.Equal(t, varsig.Version1, vs.Version())
24-
assert.Equal(t, testDiscriminator1, vs.Discriminator())
24+
assert.Equal(t, testAlgorithm1, vs.Algorithm())
2525
})
2626
}
2727

2828
const (
29-
testDiscriminator0 varsig.Discriminator = 0x1000
30-
testDiscriminator1 varsig.Discriminator = 0x1001
29+
testAlgorithm0 varsig.Algorithm = 0x1000
30+
testAlgorithm1 varsig.Algorithm = 0x1001
3131
)
3232

3333
func testRegistry(t *testing.T) varsig.Registry {
3434
t.Helper()
3535

3636
reg := varsig.NewRegistry()
37-
reg.Register(testDiscriminator0, testDecodeFunc(testDiscriminator0))
38-
reg.Register(testDiscriminator1, testDecodeFunc(testDiscriminator1))
37+
reg.Register(testAlgorithm0, testDecodeFunc(testAlgorithm0))
38+
reg.Register(testAlgorithm1, testDecodeFunc(testAlgorithm1))
3939

4040
return reg
4141
}
4242

43-
func testDecodeFunc(disc varsig.Discriminator) varsig.DecodeFunc {
43+
func testDecodeFunc(algo varsig.Algorithm) varsig.DecodeFunc {
4444
return func(r varsig.BytesReader) (varsig.Varsig, error) {
45-
return &testVarsig{disc: disc}, nil
45+
return &testVarsig{algo: algo}, nil
4646
}
4747
}
4848

4949
var _ varsig.Varsig = testVarsig{}
5050

5151
type testVarsig struct {
52-
disc varsig.Discriminator
52+
algo varsig.Algorithm
5353
payEnc varsig.PayloadEncoding
5454
}
5555

5656
func (v testVarsig) Version() varsig.Version {
5757
return varsig.Version1
5858
}
5959

60-
func (v testVarsig) Discriminator() varsig.Discriminator {
61-
return v.disc
60+
func (v testVarsig) Algorithm() varsig.Algorithm {
61+
return v.algo
6262
}
6363

6464
func (v testVarsig) Hash() varsig.Hash {

rsa.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ import (
44
"encoding/binary"
55
)
66

7-
// DiscriminatorRSA is the value specifying an RSA signature.
8-
const DiscriminatorRSA = Discriminator(0x1205)
7+
// AlgorithmRSA is the value specifying an RSA signature.
8+
const AlgorithmRSA = Algorithm(0x1205)
99

1010
var _ Varsig = RSAVarsig{}
1111

@@ -22,7 +22,7 @@ type RSAVarsig struct {
2222
func NewRSAVarsig(hashAlgorithm Hash, keyLen uint64, payloadEncoding PayloadEncoding) RSAVarsig {
2323
return RSAVarsig{
2424
varsig: varsig{
25-
disc: DiscriminatorRSA,
25+
algo: AlgorithmRSA,
2626
payEnc: payloadEncoding,
2727
},
2828
hashAlg: hashAlgorithm,

0 commit comments

Comments
 (0)