[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[GNUnet-SVN] r27326 - in gnunet/src: . dns gns gns/zonefiles include nam
From: |
gnunet |
Subject: |
[GNUnet-SVN] r27326 - in gnunet/src: . dns gns gns/zonefiles include namestore namestore/zonefiles pt |
Date: |
Wed, 29 May 2013 10:18:55 +0200 |
Author: grothoff
Date: 2013-05-29 10:18:55 +0200 (Wed, 29 May 2013)
New Revision: 27326
Modified:
gnunet/src/Makefile.am
gnunet/src/dns/plugin_block_dns.c
gnunet/src/gns/Makefile.am
gnunet/src/gns/gns_api.c
gnunet/src/gns/gnunet-gns-fcfsd.c
gnunet/src/gns/gnunet-gns-helper-service-w32.c
gnunet/src/gns/gnunet-gns-proxy.c
gnunet/src/gns/gnunet-gns.c
gnunet/src/gns/gnunet-service-gns.c
gnunet/src/gns/gnunet-service-gns_interceptor.c
gnunet/src/gns/gnunet-service-gns_interceptor.h
gnunet/src/gns/gnunet-service-gns_resolver.c
gnunet/src/gns/gnunet-service-gns_resolver.h
gnunet/src/gns/plugin_block_gns.c
gnunet/src/gns/test_gns_cname_lookup.c
gnunet/src/gns/test_gns_dht_delegated_lookup.c
gnunet/src/gns/test_gns_dht_three_peers.c
gnunet/src/gns/test_gns_max_queries.c
gnunet/src/gns/test_gns_ns_lookup.c
gnunet/src/gns/test_gns_proxy.c
gnunet/src/gns/test_gns_pseu_shorten.c
gnunet/src/gns/test_gns_revocation.c
gnunet/src/gns/test_gns_simple_delegated_lookup.c
gnunet/src/gns/test_gns_simple_get_authority.c
gnunet/src/gns/test_gns_simple_lookup.c
gnunet/src/gns/test_gns_simple_mx_lookup.c
gnunet/src/gns/test_gns_simple_shorten.c
gnunet/src/gns/test_gns_simple_srv_lookup.c
gnunet/src/gns/test_gns_simple_zkey_lookup.c
gnunet/src/gns/zonefiles/test_zonekey
gnunet/src/include/block_dns.h
gnunet/src/include/block_gns.h
gnunet/src/include/gnunet_consensus_service.h
gnunet/src/include/gnunet_crypto_lib.h
gnunet/src/include/gnunet_gns_service.h
gnunet/src/include/gnunet_namestore_plugin.h
gnunet/src/include/gnunet_namestore_service.h
gnunet/src/namestore/gnunet-namestore.c
gnunet/src/namestore/gnunet-service-namestore.c
gnunet/src/namestore/namestore.h
gnunet/src/namestore/namestore_api.c
gnunet/src/namestore/namestore_common.c
gnunet/src/namestore/plugin_namestore_postgres.c
gnunet/src/namestore/plugin_namestore_sqlite.c
gnunet/src/namestore/test_namestore_api.c
gnunet/src/namestore/test_namestore_api_create.c
gnunet/src/namestore/test_namestore_api_create_update.c
gnunet/src/namestore/test_namestore_api_lookup.c
gnunet/src/namestore/test_namestore_api_lookup_specific_type.c
gnunet/src/namestore/test_namestore_api_put.c
gnunet/src/namestore/test_namestore_api_remove.c
gnunet/src/namestore/test_namestore_api_remove_not_existing_record.c
gnunet/src/namestore/test_namestore_api_sign_verify.c
gnunet/src/namestore/test_namestore_api_zone_iteration.c
gnunet/src/namestore/test_namestore_api_zone_iteration_specific_zone.c
gnunet/src/namestore/test_namestore_api_zone_iteration_stop.c
gnunet/src/namestore/test_namestore_api_zone_to_name.c
gnunet/src/namestore/test_plugin_namestore.c
gnunet/src/namestore/zonefiles/HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey
gnunet/src/namestore/zonefiles/N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey
gnunet/src/pt/test_gns_vpn.c
gnunet/src/pt/test_gnunet_vpn.c
Log:
-switching GNS from RSA to ECC
Modified: gnunet/src/Makefile.am
===================================================================
--- gnunet/src/Makefile.am 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/Makefile.am 2013-05-29 08:18:55 UTC (rev 27326)
@@ -3,7 +3,7 @@
#endif
if HAVE_EXPERIMENTAL
- EXP_DIR = gns chat consensus dv set experimentation
+ EXP_DIR = gns consensus dv set experimentation
endif
if LINUX
Modified: gnunet/src/dns/plugin_block_dns.c
===================================================================
--- gnunet/src/dns/plugin_block_dns.c 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/dns/plugin_block_dns.c 2013-05-29 08:18:55 UTC (rev 27326)
@@ -75,13 +75,13 @@
if (ntohl (rec->purpose.size) !=
sizeof (struct GNUNET_DNS_Record) -
- sizeof (struct GNUNET_CRYPTO_RsaSignature))
+ sizeof (struct GNUNET_CRYPTO_EccSignature))
{
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"DNS-Block is invalid: rec->purpose.size=%d != %d\n",
ntohl (rec->purpose.size),
sizeof (struct GNUNET_DNS_Record) -
- sizeof (struct GNUNET_CRYPTO_RsaSignature));
+ sizeof (struct GNUNET_CRYPTO_EccSignature));
return GNUNET_BLOCK_EVALUATION_RESULT_INVALID;
}
@@ -94,7 +94,7 @@
}
if (GNUNET_OK !=
- GNUNET_CRYPTO_rsa_verify (htonl (GNUNET_SIGNATURE_PURPOSE_DNS_RECORD),
+ GNUNET_CRYPTO_ecc_verify (htonl (GNUNET_SIGNATURE_PURPOSE_DNS_RECORD),
&rec->purpose, &rec->signature, &rec->peer))
{
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
Modified: gnunet/src/gns/Makefile.am
===================================================================
--- gnunet/src/gns/Makefile.am 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/gns/Makefile.am 2013-05-29 08:18:55 UTC (rev 27326)
@@ -224,9 +224,11 @@
if ENABLE_TEST_RUN
if LINUX
+if HAVE_SQLITE
TESTS = $(check_PROGRAMS)
endif
endif
+endif
#test_gns_proxy_SOURCES = \
Modified: gnunet/src/gns/gns_api.c
===================================================================
--- gnunet/src/gns/gns_api.c 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/gns/gns_api.c 2013-05-29 08:18:55 UTC (rev 27326)
@@ -823,7 +823,7 @@
struct GNUNET_CRYPTO_ShortHashCode *zone,
enum GNUNET_GNS_RecordType type,
int only_cached,
- struct GNUNET_CRYPTO_RsaPrivateKey *shorten_key,
+ struct GNUNET_CRYPTO_EccPrivateKey *shorten_key,
GNUNET_GNS_LookupResultProcessor proc,
void *proc_cls)
{
@@ -832,7 +832,7 @@
struct GNUNET_GNS_LookupRequest *lr;
size_t msize;
struct PendingMessage *pending;
- struct GNUNET_CRYPTO_RsaPrivateKeyBinaryEncoded *pkey_enc;
+ struct GNUNET_CRYPTO_EccPrivateKeyBinaryEncoded *pkey_enc;
size_t key_len;
char* pkey_tmp;
@@ -843,9 +843,9 @@
}
if (NULL != shorten_key)
{
- pkey_enc = GNUNET_CRYPTO_rsa_encode_key (shorten_key);
+ pkey_enc = GNUNET_CRYPTO_ecc_encode_key (shorten_key);
GNUNET_assert (pkey_enc != NULL);
- key_len = ntohs (pkey_enc->len);
+ key_len = ntohs (pkey_enc->size);
}
else
{
@@ -927,7 +927,7 @@
const char *name,
enum GNUNET_GNS_RecordType type,
int only_cached,
- struct GNUNET_CRYPTO_RsaPrivateKey *shorten_key,
+ struct GNUNET_CRYPTO_EccPrivateKey *shorten_key,
GNUNET_GNS_LookupResultProcessor proc,
void *proc_cls)
{
Modified: gnunet/src/gns/gnunet-gns-fcfsd.c
===================================================================
--- gnunet/src/gns/gnunet-gns-fcfsd.c 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/gns/gnunet-gns-fcfsd.c 2013-05-29 08:18:55 UTC (rev 27326)
@@ -199,7 +199,7 @@
/**
* Private key for the fcfsd zone.
*/
-static struct GNUNET_CRYPTO_RsaPrivateKey *fcfs_zone_pkey;
+static struct GNUNET_CRYPTO_EccPrivateKey *fcfs_zone_pkey;
/**
@@ -229,12 +229,12 @@
static void
iterate_cb (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_len,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
struct ZoneinfoRequest *zr = cls;
struct MHD_Response *response;
@@ -506,12 +506,12 @@
*/
static void
zone_to_name_cb (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
struct Request *request = cls;
struct GNUNET_NAMESTORE_RecordData r;
@@ -565,12 +565,12 @@
*/
static void
lookup_result_processor (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
struct Request *request = cls;
struct GNUNET_CRYPTO_ShortHashCode pub;
@@ -862,7 +862,7 @@
}
if (NULL != fcfs_zone_pkey)
{
- GNUNET_CRYPTO_rsa_key_free (fcfs_zone_pkey);
+ GNUNET_CRYPTO_ecc_key_free (fcfs_zone_pkey);
fcfs_zone_pkey = NULL;
}
}
@@ -882,7 +882,7 @@
{
char *keyfile;
unsigned long long port;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pub;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pub;
if (GNUNET_OK !=
GNUNET_CONFIGURATION_get_value_number (cfg,
@@ -904,7 +904,7 @@
"fcfsd", "ZONEKEY");
return;
}
- fcfs_zone_pkey = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
+ fcfs_zone_pkey = GNUNET_CRYPTO_ecc_key_create_from_file (keyfile);
GNUNET_free (keyfile);
if (NULL == fcfs_zone_pkey)
{
@@ -912,7 +912,7 @@
_("Failed to read or create private zone key\n"));
return;
}
- GNUNET_CRYPTO_rsa_key_get_public (fcfs_zone_pkey,
+ GNUNET_CRYPTO_ecc_key_get_public (fcfs_zone_pkey,
&pub);
GNUNET_CRYPTO_short_hash (&pub, sizeof (pub), &fcfsd_zone);
ns = GNUNET_NAMESTORE_connect (cfg);
Modified: gnunet/src/gns/gnunet-gns-helper-service-w32.c
===================================================================
--- gnunet/src/gns/gnunet-gns-helper-service-w32.c 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/gns/gnunet-gns-helper-service-w32.c 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -63,7 +63,7 @@
static struct GNUNET_CRYPTO_ShortHashCode *zone = NULL;
static struct GNUNET_CRYPTO_ShortHashCode user_zone;
-struct GNUNET_CRYPTO_RsaPrivateKey *shorten_key = NULL;
+struct GNUNET_CRYPTO_EccPrivateKey *shorten_key = NULL;
/**
@@ -670,8 +670,8 @@
};
char* keyfile;
- struct GNUNET_CRYPTO_RsaPrivateKey *key = NULL;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *key = NULL;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pkey;
struct GNUNET_CRYPTO_ShortHashAsciiEncoded zonename;
if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (cfg, "gns",
@@ -685,16 +685,16 @@
{
if (GNUNET_YES == GNUNET_DISK_file_test (keyfile))
{
- key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (key, &pkey);
+ key = GNUNET_CRYPTO_ecc_key_create_from_file (keyfile);
+ GNUNET_CRYPTO_ecc_key_get_public (key, &pkey);
GNUNET_CRYPTO_short_hash(&pkey,
- sizeof(struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof(struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&user_zone);
zone = &user_zone;
GNUNET_CRYPTO_short_hash_to_enc (zone, &zonename);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Using zone: %s!\n", &zonename);
- GNUNET_CRYPTO_rsa_key_free(key);
+ GNUNET_CRYPTO_ecc_key_free(key);
}
GNUNET_free(keyfile);
}
@@ -710,7 +710,7 @@
{
if (GNUNET_YES == GNUNET_DISK_file_test (keyfile))
{
- shorten_key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
+ shorten_key = GNUNET_CRYPTO_ecc_key_create_from_file (keyfile);
}
GNUNET_free(keyfile);
}
Modified: gnunet/src/gns/gnunet-gns-proxy.c
===================================================================
--- gnunet/src/gns/gnunet-gns-proxy.c 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/gns/gnunet-gns-proxy.c 2013-05-29 08:18:55 UTC (rev 27326)
@@ -459,7 +459,7 @@
#endif
/* Shorten zone private key */
-static struct GNUNET_CRYPTO_RsaPrivateKey *shorten_zonekey;
+static struct GNUNET_CRYPTO_EccPrivateKey *shorten_zonekey;
/**
@@ -3188,8 +3188,8 @@
load_local_zone_key (const struct GNUNET_CONFIGURATION_Handle *cfg)
{
char *keyfile;
- struct GNUNET_CRYPTO_RsaPrivateKey *key;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pkey;
struct GNUNET_CRYPTO_ShortHashCode *zone;
struct GNUNET_CRYPTO_ShortHashAsciiEncoded zonename;
@@ -3209,17 +3209,17 @@
return GNUNET_NO;
}
- key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (key, &pkey);
+ key = GNUNET_CRYPTO_ecc_key_create_from_file (keyfile);
+ GNUNET_CRYPTO_ecc_key_get_public (key, &pkey);
local_gns_zone = GNUNET_malloc (sizeof (struct GNUNET_CRYPTO_ShortHashCode));
GNUNET_CRYPTO_short_hash(&pkey,
- sizeof(struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof(struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
local_gns_zone);
zone = local_gns_zone;
GNUNET_CRYPTO_short_hash_to_enc (zone, &zonename);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Using zone: %s!\n", &zonename);
- GNUNET_CRYPTO_rsa_key_free(key);
+ GNUNET_CRYPTO_ecc_key_free(key);
GNUNET_free(keyfile);
keyfile = NULL;
@@ -3238,16 +3238,16 @@
}
else
{
- key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (key, &pkey);
+ key = GNUNET_CRYPTO_ecc_key_create_from_file (keyfile);
+ GNUNET_CRYPTO_ecc_key_get_public (key, &pkey);
local_private_zone = GNUNET_malloc (sizeof (struct
GNUNET_CRYPTO_ShortHashCode));
GNUNET_CRYPTO_short_hash(&pkey,
- sizeof(struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof(struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
local_private_zone);
GNUNET_CRYPTO_short_hash_to_enc (zone, &zonename);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Using private zone: %s!\n", &zonename);
- GNUNET_CRYPTO_rsa_key_free(key);
+ GNUNET_CRYPTO_ecc_key_free(key);
GNUNET_free(keyfile);
}
keyfile = NULL;
@@ -3267,16 +3267,16 @@
}
else
{
- key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (key, &pkey);
+ key = GNUNET_CRYPTO_ecc_key_create_from_file (keyfile);
+ GNUNET_CRYPTO_ecc_key_get_public (key, &pkey);
local_shorten_zone = GNUNET_malloc (sizeof (struct
GNUNET_CRYPTO_ShortHashCode));
GNUNET_CRYPTO_short_hash(&pkey,
- sizeof(struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof(struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
local_shorten_zone);
GNUNET_CRYPTO_short_hash_to_enc (zone, &zonename);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Using shorten zone: %s!\n", &zonename);
- GNUNET_CRYPTO_rsa_key_free(key);
+ GNUNET_CRYPTO_ecc_key_free(key);
GNUNET_free(keyfile);
}
Modified: gnunet/src/gns/gnunet-gns.c
===================================================================
--- gnunet/src/gns/gnunet-gns.c 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/gns/gnunet-gns.c 2013-05-29 08:18:55 UTC (rev 27326)
@@ -204,13 +204,13 @@
const struct GNUNET_CONFIGURATION_Handle *cfg)
{
char* keyfile;
- struct GNUNET_CRYPTO_RsaPrivateKey *key = NULL;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *key = NULL;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pkey;
struct GNUNET_CRYPTO_ShortHashCode *zone = NULL;
struct GNUNET_CRYPTO_ShortHashCode user_zone;
struct GNUNET_CRYPTO_ShortHashAsciiEncoded zonename;
- struct GNUNET_CRYPTO_RsaPrivateKey *shorten_key = NULL;
- struct GNUNET_CRYPTO_RsaPrivateKey *private_key = NULL;
+ struct GNUNET_CRYPTO_EccPrivateKey *shorten_key = NULL;
+ struct GNUNET_CRYPTO_EccPrivateKey *private_key = NULL;
struct GNUNET_CRYPTO_ShortHashCode *private_zone = NULL;
struct GNUNET_CRYPTO_ShortHashCode *shorten_zone = NULL;
@@ -230,17 +230,17 @@
}
else
{
- key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (key, &pkey);
+ key = GNUNET_CRYPTO_ecc_key_create_from_file (keyfile);
+ GNUNET_CRYPTO_ecc_key_get_public (key, &pkey);
GNUNET_CRYPTO_short_hash (&pkey,
- sizeof(struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof(struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&user_zone);
zone = &user_zone;
GNUNET_CRYPTO_short_hash_to_enc (zone, &zonename);
if (!raw)
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Using zone: %s!\n", &zonename);
- GNUNET_CRYPTO_rsa_key_free (key);
+ GNUNET_CRYPTO_ecc_key_free (key);
GNUNET_free(keyfile);
}
@@ -253,11 +253,11 @@
}
else
{
- shorten_key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (shorten_key, &pkey);
+ shorten_key = GNUNET_CRYPTO_ecc_key_create_from_file (keyfile);
+ GNUNET_CRYPTO_ecc_key_get_public (shorten_key, &pkey);
shorten_zone = GNUNET_malloc (sizeof (struct GNUNET_CRYPTO_ShortHashCode));
GNUNET_CRYPTO_short_hash(&pkey,
- sizeof(struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof(struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
shorten_zone);
GNUNET_CRYPTO_short_hash_to_enc (shorten_zone, &zonename);
if (! raw)
@@ -275,17 +275,17 @@
}
else
{
- private_key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (private_key, &pkey);
+ private_key = GNUNET_CRYPTO_ecc_key_create_from_file (keyfile);
+ GNUNET_CRYPTO_ecc_key_get_public (private_key, &pkey);
private_zone = GNUNET_malloc (sizeof (struct GNUNET_CRYPTO_ShortHashCode));
GNUNET_CRYPTO_short_hash(&pkey,
- sizeof(struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof(struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
private_zone);
GNUNET_CRYPTO_short_hash_to_enc (private_zone, &zonename);
if (! raw)
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Using private zone: %s!\n", &zonename);
- GNUNET_CRYPTO_rsa_key_free (private_key);
+ GNUNET_CRYPTO_ecc_key_free (private_key);
}
if (NULL != lookup_type)
@@ -321,7 +321,7 @@
}
if (NULL != shorten_key)
- GNUNET_CRYPTO_rsa_key_free (shorten_key);
+ GNUNET_CRYPTO_ecc_key_free (shorten_key);
if (NULL != shorten_zone)
GNUNET_free (shorten_zone);
if (NULL != private_zone)
Modified: gnunet/src/gns/gnunet-service-gns.c
===================================================================
--- gnunet/src/gns/gnunet-service-gns.c 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/gns/gnunet-service-gns.c 2013-05-29 08:18:55 UTC (rev 27326)
@@ -168,7 +168,7 @@
/**
* optional zone private key used for shorten
*/
- struct GNUNET_CRYPTO_RsaPrivateKey *shorten_key;
+ struct GNUNET_CRYPTO_EccPrivateKey *shorten_key;
/**
* the name to look up
@@ -205,7 +205,7 @@
/**
* Our zone's private key
*/
-static struct GNUNET_CRYPTO_RsaPrivateKey *zone_key;
+static struct GNUNET_CRYPTO_EccPrivateKey *zone_key;
/**
* Our handle to the namestore service
@@ -382,12 +382,12 @@
*/
static void
put_gns_record (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *key,
struct GNUNET_TIME_Absolute expiration,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
struct GNSNameRecordBlock *nrb;
struct GNUNET_CRYPTO_ShortHashCode zhash;
@@ -475,7 +475,7 @@
nrb_data += namelen;
rd_payload_length += sizeof(struct GNSNameRecordBlock) + namelen;
GNUNET_CRYPTO_short_hash (key,
- sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&zhash);
if (-1 == GNUNET_NAMESTORE_records_serialize (rd_count,
rd,
@@ -626,12 +626,12 @@
*/
static void
process_shorten_in_private_zone_lookup (void *cls,
- const struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *key,
+ const struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *key,
struct GNUNET_TIME_Absolute expiration,
const char *name,
unsigned int rd_count,
const struct
GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature
*signature)
+ const struct GNUNET_CRYPTO_EccSignature
*signature)
{
struct ClientShortenHandle *csh = cls;
struct GNUNET_CRYPTO_ShortHashCode *szone = &csh->shorten_zone;
@@ -682,12 +682,12 @@
*/
static void
process_shorten_in_root_zone_lookup (void *cls,
- const struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *key,
+ const struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *key,
struct GNUNET_TIME_Absolute expiration,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData
*rd,
- const struct GNUNET_CRYPTO_RsaSignature
*signature)
+ const struct GNUNET_CRYPTO_EccSignature
*signature)
{
struct ClientShortenHandle *csh = cls;
struct GNUNET_CRYPTO_ShortHashCode *szone = &csh->shorten_zone;
@@ -738,12 +738,12 @@
*/
static void
process_private_in_root_zone_lookup (void *cls,
- const struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *key,
+ const struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *key,
struct GNUNET_TIME_Absolute expiration,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData
*rd,
- const struct GNUNET_CRYPTO_RsaSignature
*signature)
+ const struct GNUNET_CRYPTO_EccSignature
*signature)
{
struct ClientShortenHandle *csh = cls;
@@ -1036,7 +1036,7 @@
GNUNET_free(clh->name);
if (NULL != clh->shorten_key)
- GNUNET_CRYPTO_rsa_key_free (clh->shorten_key);
+ GNUNET_CRYPTO_ecc_key_free (clh->shorten_key);
GNUNET_free (clh);
GNUNET_STATISTICS_update (statistics,
"Completed lookups", 1, GNUNET_NO);
@@ -1064,8 +1064,8 @@
char* nameptr = name;
const char *utf_in;
int only_cached;
- struct GNUNET_CRYPTO_RsaPrivateKey *key;
- struct GNUNET_CRYPTO_RsaPrivateKeyBinaryEncoded *pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *key;
+ struct GNUNET_CRYPTO_EccPrivateKeyBinaryEncoded *pkey;
char* tmp_pkey;
uint16_t msg_size;
const struct GNUNET_GNS_ClientLookupMessage *sh_msg;
@@ -1083,10 +1083,11 @@
GNUNET_SERVER_notification_context_add (nc, client);
if (GNUNET_YES == ntohl (sh_msg->have_key))
{
- pkey = (struct GNUNET_CRYPTO_RsaPrivateKeyBinaryEncoded *) &sh_msg[1];
+ pkey = (struct GNUNET_CRYPTO_EccPrivateKeyBinaryEncoded *) &sh_msg[1];
tmp_pkey = (char*) &sh_msg[1];
- key = GNUNET_CRYPTO_rsa_decode_key (tmp_pkey, ntohs (pkey->len));
- GNUNET_STRINGS_utf8_tolower (&tmp_pkey[ntohs (pkey->len)], &nameptr);
+ key = GNUNET_CRYPTO_ecc_decode_key (tmp_pkey, ntohs (pkey->size),
+ GNUNET_NO);
+ GNUNET_STRINGS_utf8_tolower (&tmp_pkey[ntohs (pkey->size)], &nameptr);
}
else
{
@@ -1184,7 +1185,7 @@
{&handle_get_authority, NULL, GNUNET_MESSAGE_TYPE_GNS_GET_AUTH, 0}
};
char* keyfile;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pkey;
unsigned long long max_parallel_bg_queries = 0;
int ignore_pending = GNUNET_NO;
@@ -1203,10 +1204,10 @@
GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
"Using keyfile %s for root zone.\n", keyfile);
- zone_key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (zone_key, &pkey);
+ zone_key = GNUNET_CRYPTO_ecc_key_create_from_file (keyfile);
+ GNUNET_CRYPTO_ecc_key_get_public (zone_key, &pkey);
GNUNET_CRYPTO_short_hash(&pkey,
- sizeof(struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof(struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&zone_hash);
GNUNET_free(keyfile);
namestore_handle = GNUNET_NAMESTORE_connect (c);
Modified: gnunet/src/gns/gnunet-service-gns_interceptor.c
===================================================================
--- gnunet/src/gns/gnunet-service-gns_interceptor.c 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/gns/gnunet-service-gns_interceptor.c 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -66,7 +66,7 @@
/**
* Our priv key
*/
-static struct GNUNET_CRYPTO_RsaPrivateKey *our_key;
+static struct GNUNET_CRYPTO_EccPrivateKey *our_key;
/**
* Default timeout
@@ -344,7 +344,7 @@
*/
int
gns_interceptor_init (struct GNUNET_CRYPTO_ShortHashCode zone,
- struct GNUNET_CRYPTO_RsaPrivateKey *key,
+ struct GNUNET_CRYPTO_EccPrivateKey *key,
const struct GNUNET_CONFIGURATION_Handle *c)
{
GNUNET_log(GNUNET_ERROR_TYPE_INFO,
Modified: gnunet/src/gns/gnunet-service-gns_interceptor.h
===================================================================
--- gnunet/src/gns/gnunet-service-gns_interceptor.h 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/gns/gnunet-service-gns_interceptor.h 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -37,7 +37,7 @@
*/
int
gns_interceptor_init (struct GNUNET_CRYPTO_ShortHashCode zone,
- struct GNUNET_CRYPTO_RsaPrivateKey *key,
+ struct GNUNET_CRYPTO_EccPrivateKey *key,
const struct GNUNET_CONFIGURATION_Handle *c);
/**
Modified: gnunet/src/gns/gnunet-service-gns_resolver.c
===================================================================
--- gnunet/src/gns/gnunet-service-gns_resolver.c 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/gns/gnunet-service-gns_resolver.c 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -224,7 +224,7 @@
{
gph->namestore_task = NULL;
GNUNET_free (gph->auth);
- GNUNET_CRYPTO_rsa_key_free (gph->key);
+ GNUNET_CRYPTO_ecc_key_free (gph->key);
GNUNET_CONTAINER_DLL_remove (gph_head, gph_tail, gph);
GNUNET_free (gph);
}
@@ -270,11 +270,11 @@
*/
static void
process_pseu_lookup_ns (void* cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*key,
struct GNUNET_TIME_Absolute expiration,
const char *name, unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
struct GetPseuAuthorityHandle* gph = cls;
struct GNUNET_NAMESTORE_RecordData new_pkey;
@@ -463,12 +463,12 @@
*/
static void
process_auth_discovery_ns_result (void* cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*key,
struct GNUNET_TIME_Absolute expiration,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
struct GetPseuAuthorityHandle* gph = cls;
struct GNUNET_HashCode lookup_key;
@@ -536,12 +536,12 @@
*/
static void
process_zone_to_name_discover (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_len,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
struct GetPseuAuthorityHandle* gph = cls;
@@ -592,31 +592,33 @@
*/
static void
start_shorten (struct AuthorityChain *auth,
- const struct GNUNET_CRYPTO_RsaPrivateKey *key)
+ const struct GNUNET_CRYPTO_EccPrivateKey *key)
{
struct GetPseuAuthorityHandle *gph;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey;
- struct GNUNET_CRYPTO_RsaPrivateKeyBinaryEncoded *pb_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pkey;
+ struct GNUNET_CRYPTO_EccPrivateKeyBinaryEncoded *pb_key;
- GNUNET_CRYPTO_rsa_key_get_public (key, &pkey);
- if (NULL == (pb_key = GNUNET_CRYPTO_rsa_encode_key (key)))
+ GNUNET_CRYPTO_ecc_key_get_public (key, &pkey);
+ if (NULL == (pb_key = GNUNET_CRYPTO_ecc_encode_key (key)))
{
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
- "Failed to encode RSA key on shorten\n");
+ "Failed to encode ECC key on shorten\n");
return;
}
- gph = GNUNET_malloc (sizeof (struct GetPseuAuthorityHandle));
- gph->key = GNUNET_CRYPTO_rsa_decode_key ((const char*) pb_key, ntohs
(pb_key->len));
+ gph = GNUNET_new (struct GetPseuAuthorityHandle);
+ gph->key = GNUNET_CRYPTO_ecc_decode_key ((const char*) pb_key,
+ ntohs (pb_key->size),
+ GNUNET_YES);
GNUNET_free (pb_key);
if (NULL == gph->key)
{
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
- "Failed to decode RSA key on shorten\n");
+ "Failed to decode ECC key on shorten\n");
GNUNET_free (gph);
return;
}
GNUNET_CRYPTO_short_hash (&pkey,
- sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&gph->our_zone);
gph->auth = GNUNET_malloc (sizeof (struct AuthorityChain));
memcpy (gph->auth, auth, sizeof (struct AuthorityChain));
@@ -1154,11 +1156,11 @@
*/
static void
process_record_result_ns (void* cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*key,
struct GNUNET_TIME_Absolute expiration,
const char *name, unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
struct ResolverHandle *rh = cls;
struct RecordLookupHandle *rlh = rh->proc_cls;
@@ -1169,7 +1171,7 @@
rh->namestore_task = NULL;
GNUNET_CRYPTO_short_hash (key,
- sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&zone);
remaining_time = GNUNET_TIME_absolute_get_remaining (expiration);
rh->status = 0;
@@ -2034,12 +2036,12 @@
*/
static void
process_pkey_revocation_result_ns (void *cls,
- const struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *key,
+ const struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *key,
struct GNUNET_TIME_Absolute expiration,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature
*signature)
+ const struct GNUNET_CRYPTO_EccSignature
*signature)
{
struct ResolverHandle *rh = cls;
struct GNUNET_TIME_Relative remaining_time;
@@ -3063,12 +3065,12 @@
*/
static void
process_delegation_result_ns (void* cls,
- const struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *key,
+ const struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *key,
struct GNUNET_TIME_Absolute expiration,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature
*signature)
+ const struct GNUNET_CRYPTO_EccSignature
*signature)
{
struct ResolverHandle *rh = cls;
struct GNUNET_TIME_Relative remaining_time;
@@ -3080,7 +3082,7 @@
rh->namestore_task = NULL;
GNUNET_CRYPTO_short_hash (key,
- sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&zone);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"GNS_PHASE_DELEGATE_NS-%llu: Got %d records from authority lookup
for `%s' in zone %s\n",
@@ -3326,7 +3328,7 @@
struct GNUNET_CRYPTO_ShortHashCode pzone,
uint32_t record_type,
const char* name,
- struct GNUNET_CRYPTO_RsaPrivateKey *key,
+ struct GNUNET_CRYPTO_EccPrivateKey *key,
struct GNUNET_TIME_Relative timeout,
int only_cached,
RecordLookupProcessor proc,
@@ -3509,12 +3511,12 @@
*/
static void
process_zone_to_name_shorten_root (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_len,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature);
+ const struct GNUNET_CRYPTO_EccSignature *signature);
/**
@@ -3531,12 +3533,12 @@
*/
static void
process_zone_to_name_shorten_shorten (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_len,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
struct ResolverHandle *rh = cls;
struct NameShortenHandle* nsh = rh->proc_cls;
@@ -3647,12 +3649,12 @@
*/
static void
process_zone_to_name_shorten_private (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_len,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
struct ResolverHandle *rh = cls;
struct NameShortenHandle* nsh = rh->proc_cls;
@@ -3762,12 +3764,12 @@
*/
static void
process_zone_to_name_shorten_root (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_len,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
struct ResolverHandle *rh = cls;
struct NameShortenHandle* nsh = rh->proc_cls;
@@ -3985,12 +3987,12 @@
*/
static void
process_zone_to_name_zkey(void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_len,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
struct ResolverHandle *rh = cls;
struct NameShortenHandle *nsh = rh->proc_cls;
Modified: gnunet/src/gns/gnunet-service-gns_resolver.h
===================================================================
--- gnunet/src/gns/gnunet-service-gns_resolver.h 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/gns/gnunet-service-gns_resolver.h 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -327,7 +327,7 @@
* private key of an/our authoritative zone
* can be NULL but automatical PKEY import will not work
*/
- struct GNUNET_CRYPTO_RsaPrivateKey *priv_key;
+ struct GNUNET_CRYPTO_EccPrivateKey *priv_key;
/**
* the heap node associated with this lookup, null if timeout is set
@@ -484,7 +484,7 @@
/**
* the private key of the zone to store the pseu in
*/
- struct GNUNET_CRYPTO_RsaPrivateKey *key;
+ struct GNUNET_CRYPTO_EccPrivateKey *key;
/**
* a handle for dht lookups. should be NULL if no lookups are in progress
@@ -573,7 +573,7 @@
struct GNUNET_CRYPTO_ShortHashCode pzone,
uint32_t record_type,
const char* name,
- struct GNUNET_CRYPTO_RsaPrivateKey *key,
+ struct GNUNET_CRYPTO_EccPrivateKey *key,
struct GNUNET_TIME_Relative timeout,
int only_cached,
RecordLookupProcessor proc,
Modified: gnunet/src/gns/plugin_block_gns.c
===================================================================
--- gnunet/src/gns/plugin_block_gns.c 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/gns/plugin_block_gns.c 2013-05-29 08:18:55 UTC (rev 27326)
@@ -237,7 +237,7 @@
return GNUNET_SYSERR;
}
GNUNET_CRYPTO_short_hash (&nrb->public_key,
- sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&pkey_hash);
GNUNET_GNS_get_key_for_record (name, &pkey_hash, key);
return GNUNET_OK;
Modified: gnunet/src/gns/test_gns_cname_lookup.c
===================================================================
--- gnunet/src/gns/test_gns_cname_lookup.c 2013-05-29 08:18:40 UTC (rev
27325)
+++ gnunet/src/gns/test_gns_cname_lookup.c 2013-05-29 08:18:55 UTC (rev
27326)
@@ -334,9 +334,9 @@
const struct GNUNET_CONFIGURATION_Handle *ccfg,
struct GNUNET_TESTING_Peer *peer)
{
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded alice_pkey;
- struct GNUNET_CRYPTO_RsaPrivateKey *alice_key;
- struct GNUNET_CRYPTO_RsaPrivateKey *bob_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded alice_pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *alice_key;
+ struct GNUNET_CRYPTO_EccPrivateKey *bob_key;
char* alice_keyfile;
struct GNUNET_NAMESTORE_RecordData rd;
const char* ip = TEST_IP_PLUS;
@@ -365,11 +365,11 @@
return;
}
- alice_key = GNUNET_CRYPTO_rsa_key_create_from_file (alice_keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (alice_key, &alice_pkey);
+ alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (alice_keyfile);
+ GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey);
GNUNET_free(alice_keyfile);
- bob_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_BOB);
+ bob_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_BOB);
rd.expiration_time = UINT64_MAX;
GNUNET_assert(1 == inet_pton (AF_INET, ip, &web));
@@ -429,8 +429,8 @@
&rd,
&commence_testing,
NULL);
- GNUNET_CRYPTO_rsa_key_free(alice_key);
- GNUNET_CRYPTO_rsa_key_free(bob_key);
+ GNUNET_CRYPTO_ecc_key_free(alice_key);
+ GNUNET_CRYPTO_ecc_key_free(bob_key);
}
Modified: gnunet/src/gns/test_gns_dht_delegated_lookup.c
===================================================================
--- gnunet/src/gns/test_gns_dht_delegated_lookup.c 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/gns/test_gns_dht_delegated_lookup.c 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -65,10 +65,10 @@
static const struct GNUNET_CONFIGURATION_Handle *cfg;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded alice_pkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded bob_pkey;
-static struct GNUNET_CRYPTO_RsaPrivateKey *alice_key;
-static struct GNUNET_CRYPTO_RsaPrivateKey *bob_key;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded alice_pkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded bob_pkey;
+static struct GNUNET_CRYPTO_EccPrivateKey *alice_key;
+static struct GNUNET_CRYPTO_EccPrivateKey *bob_key;
/**
@@ -216,7 +216,7 @@
struct GNUNET_HashCode zone_hash_double;
uint32_t rd_payload_length;
char* nrb_data = NULL;
- struct GNUNET_CRYPTO_RsaSignature *sig;
+ struct GNUNET_CRYPTO_EccSignature *sig;
struct GNUNET_NAMESTORE_RecordData rd;
char* ip = TEST_IP;
struct in_addr *web = GNUNET_malloc(sizeof(struct in_addr));
@@ -262,7 +262,7 @@
}
GNUNET_CRYPTO_short_hash(TEST_RECORD_NAME, strlen(TEST_RECORD_NAME),
&name_hash);
GNUNET_CRYPTO_short_hash(&bob_pkey,
- sizeof(struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof(struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&zone_hash);
GNUNET_CRYPTO_short_hash_double(&zone_hash, &zone_hash_double);
GNUNET_CRYPTO_short_hash_double(&name_hash, &name_hash_double);
@@ -330,13 +330,13 @@
return;
}
- alice_key = GNUNET_CRYPTO_rsa_key_create_from_file (alice_keyfile);
- bob_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_BOB);
+ alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (alice_keyfile);
+ bob_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_BOB);
GNUNET_free(alice_keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (alice_key, &alice_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (bob_key, &bob_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (bob_key, &bob_pkey);
GNUNET_CRYPTO_short_hash(&bob_pkey, sizeof(bob_pkey), &bob_hash);
struct GNUNET_NAMESTORE_RecordData rd;
Modified: gnunet/src/gns/test_gns_dht_three_peers.c
===================================================================
--- gnunet/src/gns/test_gns_dht_three_peers.c 2013-05-29 08:18:40 UTC (rev
27325)
+++ gnunet/src/gns/test_gns_dht_three_peers.c 2013-05-29 08:18:55 UTC (rev
27326)
@@ -308,8 +308,8 @@
setup_dave (const struct GNUNET_CONFIGURATION_Handle * cfg)
{
char* keyfile;
- struct GNUNET_CRYPTO_RsaPrivateKey *key;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pkey;
struct in_addr *web;
struct GNUNET_NAMESTORE_RecordData rd;
@@ -324,7 +324,7 @@
return GNUNET_SYSERR;
}
- key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
+ key = GNUNET_CRYPTO_ecc_key_create_from_file (keyfile);
if (NULL == key)
{
@@ -336,12 +336,12 @@
if (NULL == nh[0])
{
GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to connect to namestore\n");
- GNUNET_CRYPTO_rsa_key_free (key);
+ GNUNET_CRYPTO_ecc_key_free (key);
GNUNET_free (keyfile);
return GNUNET_SYSERR;
}
- GNUNET_CRYPTO_rsa_key_get_public (key, &pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (key, &pkey);
GNUNET_CRYPTO_short_hash(&pkey, sizeof(pkey), &dave_hash);
rd.expiration_time = UINT64_MAX;
@@ -362,7 +362,7 @@
GNUNET_NAMESTORE_record_create (nh[0], key, GNUNET_GNS_MASTERZONE_STR, &rd,
&cont_ns, nh[0]);
- GNUNET_CRYPTO_rsa_key_free(key);
+ GNUNET_CRYPTO_ecc_key_free(key);
GNUNET_free(keyfile);
GNUNET_free(web);
dave_is_setup = GNUNET_YES;
@@ -374,8 +374,8 @@
setup_bob (const struct GNUNET_CONFIGURATION_Handle * cfg)
{
char* keyfile;
- struct GNUNET_CRYPTO_RsaPrivateKey *key;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pkey;
struct GNUNET_NAMESTORE_RecordData rd;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Setting up bob\n");
@@ -389,7 +389,7 @@
return GNUNET_SYSERR;
}
- key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
+ key = GNUNET_CRYPTO_ecc_key_create_from_file (keyfile);
if (NULL == key)
{
@@ -402,12 +402,12 @@
if (NULL == nh[1])
{
GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to connect to namestore\n");
- GNUNET_CRYPTO_rsa_key_free (key);
+ GNUNET_CRYPTO_ecc_key_free (key);
GNUNET_free (keyfile);
return GNUNET_SYSERR;
}
- GNUNET_CRYPTO_rsa_key_get_public (key, &pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (key, &pkey);
GNUNET_CRYPTO_short_hash(&pkey, sizeof(pkey), &bob_hash);
rd.expiration_time = UINT64_MAX;
@@ -418,7 +418,7 @@
GNUNET_NAMESTORE_record_create (nh[1], key, "buddy", &rd, &cont_ns, nh[1]);
- GNUNET_CRYPTO_rsa_key_free(key);
+ GNUNET_CRYPTO_ecc_key_free(key);
GNUNET_free(keyfile);
bob_is_setup = GNUNET_YES;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Setting up bob done\n");
@@ -429,7 +429,7 @@
setup_alice (const struct GNUNET_CONFIGURATION_Handle * cfg)
{
char* keyfile;
- struct GNUNET_CRYPTO_RsaPrivateKey *key;
+ struct GNUNET_CRYPTO_EccPrivateKey *key;
struct GNUNET_NAMESTORE_RecordData rd;
cfg_handles[2] = GNUNET_CONFIGURATION_dup (cfg);
@@ -442,7 +442,7 @@
return GNUNET_SYSERR;
}
- key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
+ key = GNUNET_CRYPTO_ecc_key_create_from_file (keyfile);
if (NULL == key)
{
@@ -455,7 +455,7 @@
if (NULL == nh[2])
{
GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to connect to namestore\n");
- GNUNET_CRYPTO_rsa_key_free (key);
+ GNUNET_CRYPTO_ecc_key_free (key);
GNUNET_free (keyfile);
return GNUNET_SYSERR;
}
@@ -473,12 +473,12 @@
if (NULL == gh)
{
GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Failed to connect to gns\n");
- GNUNET_CRYPTO_rsa_key_free (key);
+ GNUNET_CRYPTO_ecc_key_free (key);
GNUNET_free (keyfile);
return GNUNET_SYSERR;
}
- GNUNET_CRYPTO_rsa_key_free (key);
+ GNUNET_CRYPTO_ecc_key_free (key);
GNUNET_free (keyfile);
alice_is_setup = GNUNET_YES;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Setting up alice done\n");
Modified: gnunet/src/gns/test_gns_max_queries.c
===================================================================
--- gnunet/src/gns/test_gns_max_queries.c 2013-05-29 08:18:40 UTC (rev
27325)
+++ gnunet/src/gns/test_gns_max_queries.c 2013-05-29 08:18:55 UTC (rev
27326)
@@ -252,10 +252,10 @@
const struct GNUNET_CONFIGURATION_Handle *ccfg,
struct GNUNET_TESTING_Peer *peer)
{
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded alice_pkey;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded bob_pkey;
- struct GNUNET_CRYPTO_RsaPrivateKey *alice_key;
- struct GNUNET_CRYPTO_RsaPrivateKey *bob_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded alice_pkey;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded bob_pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *alice_key;
+ struct GNUNET_CRYPTO_EccPrivateKey *bob_key;
char* alice_keyfile;
struct GNUNET_CRYPTO_ShortHashCode bob_hash;
@@ -292,11 +292,11 @@
}
requests = GNUNET_malloc ((max_parallel_lookups + TEST_ADDITIONAL_LOOKUPS +
1) *
sizeof (struct GNUNET_GNS_LookupRequest *));
- alice_key = GNUNET_CRYPTO_rsa_key_create_from_file (alice_keyfile);
- bob_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_BOB);
+ alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (alice_keyfile);
+ bob_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_BOB);
- GNUNET_CRYPTO_rsa_key_get_public (alice_key, &alice_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (bob_key, &bob_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (bob_key, &bob_pkey);
GNUNET_free(alice_keyfile);
@@ -329,8 +329,8 @@
&commence_testing,
NULL);
- GNUNET_CRYPTO_rsa_key_free(alice_key);
- GNUNET_CRYPTO_rsa_key_free(bob_key);
+ GNUNET_CRYPTO_ecc_key_free(alice_key);
+ GNUNET_CRYPTO_ecc_key_free(bob_key);
GNUNET_free(web);
}
Modified: gnunet/src/gns/test_gns_ns_lookup.c
===================================================================
--- gnunet/src/gns/test_gns_ns_lookup.c 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/gns/test_gns_ns_lookup.c 2013-05-29 08:18:55 UTC (rev 27326)
@@ -134,7 +134,7 @@
/**
* Our private key for signing records.
*/
-static struct GNUNET_CRYPTO_RsaPrivateKey *alice_key;
+static struct GNUNET_CRYPTO_EccPrivateKey *alice_key;
/**
@@ -174,7 +174,7 @@
}
if (NULL != alice_key)
{
- GNUNET_CRYPTO_rsa_key_free (alice_key);
+ GNUNET_CRYPTO_ecc_key_free (alice_key);
alice_key = NULL;
}
GNUNET_break (0);
@@ -229,7 +229,7 @@
}
if (NULL != alice_key)
{
- GNUNET_CRYPTO_rsa_key_free (alice_key);
+ GNUNET_CRYPTO_ecc_key_free (alice_key);
alice_key = NULL;
}
GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Shutting down peer!\n");
@@ -592,7 +592,7 @@
const struct GNUNET_CONFIGURATION_Handle *ccfg,
struct GNUNET_TESTING_Peer *peer)
{
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded alice_pkey;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded alice_pkey;
char* alice_keyfile;
struct GNUNET_NAMESTORE_RecordData rd;
struct in_addr ns;
@@ -621,8 +621,8 @@
return;
}
- alice_key = GNUNET_CRYPTO_rsa_key_create_from_file (alice_keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (alice_key, &alice_pkey);
+ alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (alice_keyfile);
+ GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey);
GNUNET_free (alice_keyfile);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
Modified: gnunet/src/gns/test_gns_proxy.c
===================================================================
--- gnunet/src/gns/test_gns_proxy.c 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/gns/test_gns_proxy.c 2013-05-29 08:18:55 UTC (rev 27326)
@@ -364,7 +364,7 @@
struct GNUNET_TESTING_Peer *peer)
{
enum MHD_FLAG flags;
- struct GNUNET_CRYPTO_RsaPrivateKey *host_key;
+ struct GNUNET_CRYPTO_EccPrivateKey *host_key;
struct GNUNET_NAMESTORE_RecordData rd;
char *zone_keyfile;
@@ -421,7 +421,7 @@
return;
}
- host_key = GNUNET_CRYPTO_rsa_key_create_from_file (zone_keyfile);
+ host_key = GNUNET_CRYPTO_ecc_key_create_from_file (zone_keyfile);
rd.expiration_time = GNUNET_TIME_UNIT_FOREVER_ABS.abs_value;
GNUNET_assert (GNUNET_OK == GNUNET_NAMESTORE_string_to_value
(GNUNET_GNS_RECORD_A,
"127.0.0.1",
@@ -438,7 +438,7 @@
GNUNET_free ((void**)rd.data);
GNUNET_free (zone_keyfile);
- GNUNET_CRYPTO_rsa_key_free (host_key);
+ GNUNET_CRYPTO_ecc_key_free (host_key);
}
int
@@ -460,7 +460,7 @@
}
GNUNET_free (binary);
- GNUNET_CRYPTO_rsa_setup_hostkey ("test_gns_proxy.conf");
+ GNUNET_CRYPTO_ecc_setup_hostkey ("test_gns_proxy.conf");
if (0 != curl_global_init (CURL_GLOBAL_WIN32))
{
Modified: gnunet/src/gns/test_gns_pseu_shorten.c
===================================================================
--- gnunet/src/gns/test_gns_pseu_shorten.c 2013-05-29 08:18:40 UTC (rev
27325)
+++ gnunet/src/gns/test_gns_pseu_shorten.c 2013-05-29 08:18:55 UTC (rev
27326)
@@ -71,16 +71,16 @@
static const struct GNUNET_CONFIGURATION_Handle *cfg;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded alice_pkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded bob_pkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded our_pkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded priv_pkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded short_pkey;
-static struct GNUNET_CRYPTO_RsaPrivateKey *alice_key;
-static struct GNUNET_CRYPTO_RsaPrivateKey *bob_key;
-static struct GNUNET_CRYPTO_RsaPrivateKey *our_key;
-static struct GNUNET_CRYPTO_RsaPrivateKey *priv_key;
-static struct GNUNET_CRYPTO_RsaPrivateKey *short_key;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded alice_pkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded bob_pkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded our_pkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded priv_pkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded short_pkey;
+static struct GNUNET_CRYPTO_EccPrivateKey *alice_key;
+static struct GNUNET_CRYPTO_EccPrivateKey *bob_key;
+static struct GNUNET_CRYPTO_EccPrivateKey *our_key;
+static struct GNUNET_CRYPTO_EccPrivateKey *priv_key;
+static struct GNUNET_CRYPTO_EccPrivateKey *short_key;
static struct GNUNET_CRYPTO_ShortHashCode alice_hash;
static struct GNUNET_CRYPTO_ShortHashCode bob_hash;
static struct GNUNET_CRYPTO_ShortHashCode our_zone;
@@ -236,9 +236,9 @@
static void
commence_testing (void *cls, int success)
{
- GNUNET_CRYPTO_rsa_key_free(our_key);
- GNUNET_CRYPTO_rsa_key_free(bob_key);
- GNUNET_CRYPTO_rsa_key_free(alice_key);
+ GNUNET_CRYPTO_ecc_key_free(our_key);
+ GNUNET_CRYPTO_ecc_key_free(bob_key);
+ GNUNET_CRYPTO_ecc_key_free(alice_key);
GNUNET_NAMESTORE_disconnect (namestore_handle);
namestore_handle = NULL;
gns_handle = GNUNET_GNS_connect(cfg);
@@ -267,7 +267,7 @@
struct GNUNET_HashCode zone_hash_double;
uint32_t rd_payload_length;
char* nrb_data = NULL;
- struct GNUNET_CRYPTO_RsaSignature *sig;
+ struct GNUNET_CRYPTO_EccSignature *sig;
struct GNUNET_NAMESTORE_RecordData rd;
memset (&rd, 0, sizeof (struct GNUNET_NAMESTORE_RecordData));
@@ -308,9 +308,9 @@
{
GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Record serialization failed!\n");
ok = 3;
- GNUNET_CRYPTO_rsa_key_free(our_key);
- GNUNET_CRYPTO_rsa_key_free(bob_key);
- GNUNET_CRYPTO_rsa_key_free(alice_key);
+ GNUNET_CRYPTO_ecc_key_free(our_key);
+ GNUNET_CRYPTO_ecc_key_free(bob_key);
+ GNUNET_CRYPTO_ecc_key_free(alice_key);
GNUNET_free(sig);
GNUNET_free (nrb);
end_badly_now ();
@@ -318,7 +318,7 @@
}
GNUNET_CRYPTO_short_hash(GNUNET_GNS_MASTERZONE_STR,
strlen(GNUNET_GNS_MASTERZONE_STR), &name_hash);
GNUNET_CRYPTO_short_hash(&alice_pkey,
- sizeof(struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof(struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&zone_hash);
GNUNET_CRYPTO_short_hash_double(&name_hash, &name_hash_double);
@@ -355,7 +355,7 @@
struct GNUNET_HashCode zone_hash_double;
uint32_t rd_payload_length;
char* nrb_data = NULL;
- struct GNUNET_CRYPTO_RsaSignature *sig;
+ struct GNUNET_CRYPTO_EccSignature *sig;
struct GNUNET_NAMESTORE_RecordData rd;
char* ip = TEST_IP;
struct in_addr *web = GNUNET_malloc(sizeof(struct in_addr));
@@ -396,9 +396,9 @@
{
GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Record serialization failed!\n");
ok = 3;
- GNUNET_CRYPTO_rsa_key_free(our_key);
- GNUNET_CRYPTO_rsa_key_free(bob_key);
- GNUNET_CRYPTO_rsa_key_free(alice_key);
+ GNUNET_CRYPTO_ecc_key_free(our_key);
+ GNUNET_CRYPTO_ecc_key_free(bob_key);
+ GNUNET_CRYPTO_ecc_key_free(alice_key);
GNUNET_free (sig);
GNUNET_free(web);
GNUNET_free (nrb);
@@ -407,7 +407,7 @@
}
GNUNET_CRYPTO_short_hash(TEST_RECORD_NAME, strlen(TEST_RECORD_NAME),
&name_hash);
GNUNET_CRYPTO_short_hash(&alice_pkey,
- sizeof(struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof(struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&zone_hash);
GNUNET_CRYPTO_short_hash_double(&zone_hash, &zone_hash_double);
GNUNET_CRYPTO_short_hash_double(&name_hash, &name_hash_double);
@@ -443,7 +443,7 @@
struct GNUNET_HashCode zone_hash_double;
uint32_t rd_payload_length;
char* nrb_data = NULL;
- struct GNUNET_CRYPTO_RsaSignature *sig;
+ struct GNUNET_CRYPTO_EccSignature *sig;
struct GNUNET_NAMESTORE_RecordData rd;
rd.expiration_time = UINT64_MAX;
@@ -477,9 +477,9 @@
GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Record serialization failed!\n");
ok = 3;
- GNUNET_CRYPTO_rsa_key_free (our_key);
- GNUNET_CRYPTO_rsa_key_free (bob_key);
- GNUNET_CRYPTO_rsa_key_free (alice_key);
+ GNUNET_CRYPTO_ecc_key_free (our_key);
+ GNUNET_CRYPTO_ecc_key_free (bob_key);
+ GNUNET_CRYPTO_ecc_key_free (alice_key);
GNUNET_free (sig);
GNUNET_free (nrb);
end_badly_now ();
@@ -490,7 +490,7 @@
GNUNET_CRYPTO_short_hash(TEST_AUTHORITY_ALICE,
strlen(TEST_AUTHORITY_ALICE), &name_hash);
GNUNET_CRYPTO_short_hash(&bob_pkey,
- sizeof(struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof(struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&zone_hash);
GNUNET_CRYPTO_short_hash_double(&zone_hash, &zone_hash_double);
GNUNET_CRYPTO_short_hash_double(&name_hash, &name_hash_double);
@@ -610,21 +610,21 @@
end_badly_now();
return;
}
- our_key = GNUNET_CRYPTO_rsa_key_create_from_file (our_keyfile);
- priv_key = GNUNET_CRYPTO_rsa_key_create_from_file (private_keyfile);
- short_key = GNUNET_CRYPTO_rsa_key_create_from_file (shorten_keyfile);
- bob_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_BOB);
- alice_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_ALICE);
+ our_key = GNUNET_CRYPTO_ecc_key_create_from_file (our_keyfile);
+ priv_key = GNUNET_CRYPTO_ecc_key_create_from_file (private_keyfile);
+ short_key = GNUNET_CRYPTO_ecc_key_create_from_file (shorten_keyfile);
+ bob_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_BOB);
+ alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_ALICE);
GNUNET_free(our_keyfile);
GNUNET_free(shorten_keyfile);
GNUNET_free(private_keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (our_key, &our_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (priv_key, &priv_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (short_key, &short_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (bob_key, &bob_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (alice_key, &alice_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (our_key, &our_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (priv_key, &priv_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (short_key, &short_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (bob_key, &bob_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey);
GNUNET_CRYPTO_short_hash(&bob_pkey, sizeof(bob_pkey), &bob_hash);
GNUNET_CRYPTO_short_hash(&alice_pkey, sizeof(alice_pkey), &alice_hash);
GNUNET_CRYPTO_short_hash(&our_pkey, sizeof(our_pkey), &our_zone);
Modified: gnunet/src/gns/test_gns_revocation.c
===================================================================
--- gnunet/src/gns/test_gns_revocation.c 2013-05-29 08:18:40 UTC (rev
27325)
+++ gnunet/src/gns/test_gns_revocation.c 2013-05-29 08:18:55 UTC (rev
27326)
@@ -180,12 +180,12 @@
const struct GNUNET_CONFIGURATION_Handle *ccfg,
struct GNUNET_TESTING_Peer *peer)
{
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded alice_pkey;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded bob_pkey;
- struct GNUNET_CRYPTO_RsaPrivateKey *alice_key;
- struct GNUNET_CRYPTO_RsaPrivateKey *bob_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded alice_pkey;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded bob_pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *alice_key;
+ struct GNUNET_CRYPTO_EccPrivateKey *bob_key;
struct GNUNET_CRYPTO_ShortHashCode bob_hash;
- struct GNUNET_CRYPTO_RsaSignature *sig;
+ struct GNUNET_CRYPTO_EccSignature *sig;
char* alice_keyfile;
cfg = ccfg;
@@ -209,11 +209,11 @@
return;
}
- alice_key = GNUNET_CRYPTO_rsa_key_create_from_file (alice_keyfile);
- bob_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_BOB);
+ alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (alice_keyfile);
+ bob_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_BOB);
- GNUNET_CRYPTO_rsa_key_get_public (alice_key, &alice_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (bob_key, &bob_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (bob_key, &bob_pkey);
struct GNUNET_NAMESTORE_RecordData rd;
char* ip = TEST_IP;
@@ -264,8 +264,8 @@
GNUNET_free (alice_keyfile);
GNUNET_free (web);
GNUNET_free (sig);
- GNUNET_CRYPTO_rsa_key_free (bob_key);
- GNUNET_CRYPTO_rsa_key_free (alice_key);
+ GNUNET_CRYPTO_ecc_key_free (bob_key);
+ GNUNET_CRYPTO_ecc_key_free (alice_key);
}
Modified: gnunet/src/gns/test_gns_simple_delegated_lookup.c
===================================================================
--- gnunet/src/gns/test_gns_simple_delegated_lookup.c 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/gns/test_gns_simple_delegated_lookup.c 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -189,12 +189,12 @@
const struct GNUNET_CONFIGURATION_Handle *ccfg,
struct GNUNET_TESTING_Peer *peer)
{
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded alice_pkey;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded bob_pkey;
- struct GNUNET_CRYPTO_RsaPrivateKey *alice_key;
- struct GNUNET_CRYPTO_RsaPrivateKey *bob_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded alice_pkey;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded bob_pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *alice_key;
+ struct GNUNET_CRYPTO_EccPrivateKey *bob_key;
struct GNUNET_CRYPTO_ShortHashCode bob_hash;
- struct GNUNET_CRYPTO_RsaSignature *sig;
+ struct GNUNET_CRYPTO_EccSignature *sig;
char* alice_keyfile;
struct GNUNET_TIME_Absolute et;
struct GNUNET_NAMESTORE_RecordData rd;
@@ -223,10 +223,10 @@
GNUNET_SCHEDULER_shutdown ();
return;
}
- alice_key = GNUNET_CRYPTO_rsa_key_create_from_file (alice_keyfile);
- bob_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_BOB);
- GNUNET_CRYPTO_rsa_key_get_public (alice_key, &alice_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (bob_key, &bob_pkey);
+ alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (alice_keyfile);
+ bob_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_BOB);
+ GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (bob_key, &bob_pkey);
rd.expiration_time = UINT64_MAX;
GNUNET_assert (1 == inet_pton (AF_INET, ip, &web));
GNUNET_CRYPTO_short_hash (&bob_pkey, sizeof(bob_pkey), &bob_hash);
@@ -259,8 +259,8 @@
NULL);
GNUNET_free (sig);
GNUNET_free (alice_keyfile);
- GNUNET_CRYPTO_rsa_key_free (bob_key);
- GNUNET_CRYPTO_rsa_key_free (alice_key);
+ GNUNET_CRYPTO_ecc_key_free (bob_key);
+ GNUNET_CRYPTO_ecc_key_free (alice_key);
}
Modified: gnunet/src/gns/test_gns_simple_get_authority.c
===================================================================
--- gnunet/src/gns/test_gns_simple_get_authority.c 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/gns/test_gns_simple_get_authority.c 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -178,15 +178,15 @@
const struct GNUNET_CONFIGURATION_Handle *ccfg,
struct GNUNET_TESTING_Peer *peer)
{
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded our_pkey;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded alice_pkey;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded bob_pkey;
- struct GNUNET_CRYPTO_RsaPrivateKey *our_key;
- struct GNUNET_CRYPTO_RsaPrivateKey *alice_key;
- struct GNUNET_CRYPTO_RsaPrivateKey *bob_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded our_pkey;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded alice_pkey;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded bob_pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *our_key;
+ struct GNUNET_CRYPTO_EccPrivateKey *alice_key;
+ struct GNUNET_CRYPTO_EccPrivateKey *bob_key;
struct GNUNET_CRYPTO_ShortHashCode bob_hash;
struct GNUNET_CRYPTO_ShortHashCode alice_hash;
- struct GNUNET_CRYPTO_RsaSignature *sig;
+ struct GNUNET_CRYPTO_EccSignature *sig;
char* our_keyfile;
cfg = ccfg;
@@ -211,15 +211,15 @@
return;
}
- our_key = GNUNET_CRYPTO_rsa_key_create_from_file (our_keyfile);
+ our_key = GNUNET_CRYPTO_ecc_key_create_from_file (our_keyfile);
GNUNET_free(our_keyfile);
- bob_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_BOB);
- alice_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_ALICE);
+ bob_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_BOB);
+ alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_ALICE);
- GNUNET_CRYPTO_rsa_key_get_public (our_key, &our_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (alice_key, &alice_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (bob_key, &bob_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (our_key, &our_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (bob_key, &bob_pkey);
struct GNUNET_NAMESTORE_RecordData rd;
char* ip = TEST_IP;
@@ -298,9 +298,9 @@
GNUNET_free (web);
GNUNET_free (sig);
- GNUNET_CRYPTO_rsa_key_free (alice_key);
- GNUNET_CRYPTO_rsa_key_free (bob_key);
- GNUNET_CRYPTO_rsa_key_free (our_key);
+ GNUNET_CRYPTO_ecc_key_free (alice_key);
+ GNUNET_CRYPTO_ecc_key_free (bob_key);
+ GNUNET_CRYPTO_ecc_key_free (our_key);
}
Modified: gnunet/src/gns/test_gns_simple_lookup.c
===================================================================
--- gnunet/src/gns/test_gns_simple_lookup.c 2013-05-29 08:18:40 UTC (rev
27325)
+++ gnunet/src/gns/test_gns_simple_lookup.c 2013-05-29 08:18:55 UTC (rev
27326)
@@ -221,8 +221,8 @@
const struct GNUNET_CONFIGURATION_Handle *ccfg,
struct GNUNET_TESTING_Peer *peer)
{
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded alice_pkey;
- struct GNUNET_CRYPTO_RsaPrivateKey *alice_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded alice_pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *alice_key;
struct GNUNET_NAMESTORE_RecordData rd;
char* alice_keyfile;
char* ip = TEST_IP;
@@ -251,8 +251,8 @@
return;
}
- alice_key = GNUNET_CRYPTO_rsa_key_create_from_file (alice_keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (alice_key, &alice_pkey);
+ alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (alice_keyfile);
+ GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey);
GNUNET_free (alice_keyfile);
rd.expiration_time = UINT64_MAX;
GNUNET_assert (1 == inet_pton (AF_INET, ip, &web));
@@ -266,7 +266,7 @@
&rd,
&commence_testing,
NULL);
- GNUNET_CRYPTO_rsa_key_free (alice_key);
+ GNUNET_CRYPTO_ecc_key_free (alice_key);
}
Modified: gnunet/src/gns/test_gns_simple_mx_lookup.c
===================================================================
--- gnunet/src/gns/test_gns_simple_mx_lookup.c 2013-05-29 08:18:40 UTC (rev
27325)
+++ gnunet/src/gns/test_gns_simple_mx_lookup.c 2013-05-29 08:18:55 UTC (rev
27326)
@@ -180,12 +180,12 @@
const struct GNUNET_CONFIGURATION_Handle *ccfg,
struct GNUNET_TESTING_Peer *peer)
{
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded alice_pkey;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded bob_pkey;
- struct GNUNET_CRYPTO_RsaPrivateKey *alice_key;
- struct GNUNET_CRYPTO_RsaPrivateKey *bob_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded alice_pkey;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded bob_pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *alice_key;
+ struct GNUNET_CRYPTO_EccPrivateKey *bob_key;
struct GNUNET_CRYPTO_ShortHashCode bob_hash;
- struct GNUNET_CRYPTO_RsaSignature *sig;
+ struct GNUNET_CRYPTO_EccSignature *sig;
char* alice_keyfile;
struct GNUNET_TIME_Absolute et;
@@ -210,11 +210,11 @@
return;
}
- alice_key = GNUNET_CRYPTO_rsa_key_create_from_file (alice_keyfile);
- bob_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_BOB);
+ alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (alice_keyfile);
+ bob_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_BOB);
- GNUNET_CRYPTO_rsa_key_get_public (alice_key, &alice_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (bob_key, &bob_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (bob_key, &bob_pkey);
struct GNUNET_NAMESTORE_RecordData rd;
char* ip = TEST_IP;
@@ -282,8 +282,8 @@
GNUNET_free (mx_record);
GNUNET_free (mail);
GNUNET_free (sig);
- GNUNET_CRYPTO_rsa_key_free (bob_key);
- GNUNET_CRYPTO_rsa_key_free (alice_key);
+ GNUNET_CRYPTO_ecc_key_free (bob_key);
+ GNUNET_CRYPTO_ecc_key_free (alice_key);
}
Modified: gnunet/src/gns/test_gns_simple_shorten.c
===================================================================
--- gnunet/src/gns/test_gns_simple_shorten.c 2013-05-29 08:18:40 UTC (rev
27325)
+++ gnunet/src/gns/test_gns_simple_shorten.c 2013-05-29 08:18:55 UTC (rev
27326)
@@ -61,10 +61,10 @@
const struct GNUNET_CONFIGURATION_Handle *cfg;
-struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded priv_pkey;
-struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded short_pkey;
-struct GNUNET_CRYPTO_RsaPrivateKey *priv_key;
-struct GNUNET_CRYPTO_RsaPrivateKey *short_key;
+struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded priv_pkey;
+struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded short_pkey;
+struct GNUNET_CRYPTO_EccPrivateKey *priv_key;
+struct GNUNET_CRYPTO_EccPrivateKey *short_key;
struct GNUNET_CRYPTO_ShortHashCode priv_zone;
struct GNUNET_CRYPTO_ShortHashCode short_zone;
@@ -170,15 +170,15 @@
const struct GNUNET_CONFIGURATION_Handle *ccfg,
struct GNUNET_TESTING_Peer *peer)
{
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded our_pkey;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded alice_pkey;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded bob_pkey;
- struct GNUNET_CRYPTO_RsaPrivateKey *our_key;
- struct GNUNET_CRYPTO_RsaPrivateKey *alice_key;
- struct GNUNET_CRYPTO_RsaPrivateKey *bob_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded our_pkey;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded alice_pkey;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded bob_pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *our_key;
+ struct GNUNET_CRYPTO_EccPrivateKey *alice_key;
+ struct GNUNET_CRYPTO_EccPrivateKey *bob_key;
struct GNUNET_CRYPTO_ShortHashCode bob_hash;
struct GNUNET_CRYPTO_ShortHashCode alice_hash;
- struct GNUNET_CRYPTO_RsaSignature *sig;
+ struct GNUNET_CRYPTO_EccSignature *sig;
char* our_keyfile;
char* private_keyfile;
char* shorten_keyfile;
@@ -226,22 +226,22 @@
return;
}
- our_key = GNUNET_CRYPTO_rsa_key_create_from_file (our_keyfile);
+ our_key = GNUNET_CRYPTO_ecc_key_create_from_file (our_keyfile);
GNUNET_free(our_keyfile);
- bob_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_BOB);
- alice_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_ALICE);
- priv_key = GNUNET_CRYPTO_rsa_key_create_from_file (private_keyfile);
- short_key = GNUNET_CRYPTO_rsa_key_create_from_file (shorten_keyfile);
+ bob_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_BOB);
+ alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_ALICE);
+ priv_key = GNUNET_CRYPTO_ecc_key_create_from_file (private_keyfile);
+ short_key = GNUNET_CRYPTO_ecc_key_create_from_file (shorten_keyfile);
GNUNET_free(shorten_keyfile);
GNUNET_free(private_keyfile);
- GNUNET_CRYPTO_rsa_key_get_public (our_key, &our_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (alice_key, &alice_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (bob_key, &bob_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (priv_key, &priv_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (short_key, &short_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (our_key, &our_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (bob_key, &bob_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (priv_key, &priv_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (short_key, &short_pkey);
GNUNET_CRYPTO_short_hash(&priv_pkey, sizeof(priv_pkey), &priv_zone);
GNUNET_CRYPTO_short_hash(&short_pkey, sizeof(short_pkey), &short_zone);
@@ -318,11 +318,11 @@
NULL);
GNUNET_free(web);
- GNUNET_CRYPTO_rsa_key_free(our_key);
- GNUNET_CRYPTO_rsa_key_free(bob_key);
- GNUNET_CRYPTO_rsa_key_free(alice_key);
- GNUNET_CRYPTO_rsa_key_free(priv_key);
- GNUNET_CRYPTO_rsa_key_free(short_key);
+ GNUNET_CRYPTO_ecc_key_free(our_key);
+ GNUNET_CRYPTO_ecc_key_free(bob_key);
+ GNUNET_CRYPTO_ecc_key_free(alice_key);
+ GNUNET_CRYPTO_ecc_key_free(priv_key);
+ GNUNET_CRYPTO_ecc_key_free(short_key);
}
Modified: gnunet/src/gns/test_gns_simple_srv_lookup.c
===================================================================
--- gnunet/src/gns/test_gns_simple_srv_lookup.c 2013-05-29 08:18:40 UTC (rev
27325)
+++ gnunet/src/gns/test_gns_simple_srv_lookup.c 2013-05-29 08:18:55 UTC (rev
27326)
@@ -182,12 +182,12 @@
const struct GNUNET_CONFIGURATION_Handle *ccfg,
struct GNUNET_TESTING_Peer *peer)
{
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded alice_pkey;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded bob_pkey;
- struct GNUNET_CRYPTO_RsaPrivateKey *alice_key;
- struct GNUNET_CRYPTO_RsaPrivateKey *bob_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded alice_pkey;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded bob_pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *alice_key;
+ struct GNUNET_CRYPTO_EccPrivateKey *bob_key;
struct GNUNET_CRYPTO_ShortHashCode bob_hash;
- struct GNUNET_CRYPTO_RsaSignature *sig;
+ struct GNUNET_CRYPTO_EccSignature *sig;
char* alice_keyfile;
struct srv_data *srv_data;
struct GNUNET_TIME_Absolute et;
@@ -213,11 +213,11 @@
return;
}
- alice_key = GNUNET_CRYPTO_rsa_key_create_from_file (alice_keyfile);
- bob_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_BOB);
+ alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (alice_keyfile);
+ bob_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_BOB);
- GNUNET_CRYPTO_rsa_key_get_public (alice_key, &alice_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (bob_key, &bob_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (bob_key, &bob_pkey);
struct GNUNET_NAMESTORE_RecordData rd;
char* ip = TEST_IP;
@@ -288,8 +288,8 @@
GNUNET_free (srv_data);
GNUNET_free (sipserver);
GNUNET_free (sig);
- GNUNET_CRYPTO_rsa_key_free (bob_key);
- GNUNET_CRYPTO_rsa_key_free (alice_key);
+ GNUNET_CRYPTO_ecc_key_free (bob_key);
+ GNUNET_CRYPTO_ecc_key_free (alice_key);
}
Modified: gnunet/src/gns/test_gns_simple_zkey_lookup.c
===================================================================
--- gnunet/src/gns/test_gns_simple_zkey_lookup.c 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/gns/test_gns_simple_zkey_lookup.c 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -199,11 +199,11 @@
const struct GNUNET_CONFIGURATION_Handle *ccfg,
struct GNUNET_TESTING_Peer *peer)
{
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded alice_pkey;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded bob_pkey;
- struct GNUNET_CRYPTO_RsaPrivateKey *alice_key;
- struct GNUNET_CRYPTO_RsaPrivateKey *bob_key;
- struct GNUNET_CRYPTO_RsaSignature *sig;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded alice_pkey;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded bob_pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *alice_key;
+ struct GNUNET_CRYPTO_EccPrivateKey *bob_key;
+ struct GNUNET_CRYPTO_EccSignature *sig;
char* alice_keyfile;
cfg = ccfg;
@@ -227,11 +227,11 @@
return;
}
- alice_key = GNUNET_CRYPTO_rsa_key_create_from_file (alice_keyfile);
- bob_key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE_BOB);
+ alice_key = GNUNET_CRYPTO_ecc_key_create_from_file (alice_keyfile);
+ bob_key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE_BOB);
- GNUNET_CRYPTO_rsa_key_get_public (alice_key, &alice_pkey);
- GNUNET_CRYPTO_rsa_key_get_public (bob_key, &bob_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (alice_key, &alice_pkey);
+ GNUNET_CRYPTO_ecc_key_get_public (bob_key, &bob_pkey);
struct GNUNET_NAMESTORE_RecordData rd;
char* ip = TEST_IP;
@@ -273,8 +273,8 @@
GNUNET_free (alice_keyfile);
GNUNET_free (web);
GNUNET_free (sig);
- GNUNET_CRYPTO_rsa_key_free (bob_key);
- GNUNET_CRYPTO_rsa_key_free (alice_key);
+ GNUNET_CRYPTO_ecc_key_free (bob_key);
+ GNUNET_CRYPTO_ecc_key_free (alice_key);
}
Modified: gnunet/src/gns/zonefiles/test_zonekey
===================================================================
(Binary files differ)
Modified: gnunet/src/include/block_dns.h
===================================================================
--- gnunet/src/include/block_dns.h 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/include/block_dns.h 2013-05-29 08:18:55 UTC (rev 27326)
@@ -47,18 +47,18 @@
/**
* Signature of the peer affirming that he is offering the service.
*/
- struct GNUNET_CRYPTO_RsaSignature signature;
+ struct GNUNET_CRYPTO_EccSignature signature;
/**
* Beginning of signed portion of the record, signs everything until
* the end of the struct.
*/
- struct GNUNET_CRYPTO_RsaSignaturePurpose purpose;
+ struct GNUNET_CRYPTO_EccSignaturePurpose purpose;
/**
* The peer providing this service
*/
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded peer;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded peer;
/**
* The descriptor for the service
Modified: gnunet/src/include/block_gns.h
===================================================================
--- gnunet/src/include/block_gns.h 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/include/block_gns.h 2013-05-29 08:18:55 UTC (rev 27326)
@@ -39,12 +39,12 @@
/**
* The public key of the authority
*/
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded public_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded public_key;
/**
* GNUNET_RSA_Signature using RSA-key generated from the records.
*/
- struct GNUNET_CRYPTO_RsaSignature signature;
+ struct GNUNET_CRYPTO_EccSignature signature;
/* number of records that follow */
uint32_t rd_count GNUNET_PACKED;
Modified: gnunet/src/include/gnunet_consensus_service.h
===================================================================
--- gnunet/src/include/gnunet_consensus_service.h 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/include/gnunet_consensus_service.h 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -4,7 +4,7 @@
GNUnet is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published
- by the Free Software Foundation; either version 2, or (at your
+ by the Free Software Foundation; either version 3, or (at your
option) any later version.
GNUnet is distributed in the hope that it will be useful, but
Modified: gnunet/src/include/gnunet_crypto_lib.h
===================================================================
--- gnunet/src/include/gnunet_crypto_lib.h 2013-05-29 08:18:40 UTC (rev
27325)
+++ gnunet/src/include/gnunet_crypto_lib.h 2013-05-29 08:18:55 UTC (rev
27326)
@@ -299,10 +299,13 @@
};
+/**
+ * Private ECC key encoded for transmission (with length prefix).
+ */
struct GNUNET_CRYPTO_EccPrivateKeyBinaryEncoded
{
/**
- * Overall size of the private key.
+ * Overall size of the private key in network byte order.
*/
uint16_t size;
Modified: gnunet/src/include/gnunet_gns_service.h
===================================================================
--- gnunet/src/include/gnunet_gns_service.h 2013-05-29 08:18:40 UTC (rev
27325)
+++ gnunet/src/include/gnunet_gns_service.h 2013-05-29 08:18:55 UTC (rev
27326)
@@ -173,7 +173,7 @@
const char * name,
enum GNUNET_GNS_RecordType type,
int only_cached,
- struct GNUNET_CRYPTO_RsaPrivateKey *shorten_key,
+ struct GNUNET_CRYPTO_EccPrivateKey *shorten_key,
GNUNET_GNS_LookupResultProcessor proc,
void *proc_cls);
@@ -199,7 +199,7 @@
struct GNUNET_CRYPTO_ShortHashCode *zone,
enum GNUNET_GNS_RecordType type,
int only_cached,
- struct GNUNET_CRYPTO_RsaPrivateKey *shorten_key,
+ struct GNUNET_CRYPTO_EccPrivateKey *shorten_key,
GNUNET_GNS_LookupResultProcessor proc,
void *proc_cls);
Modified: gnunet/src/include/gnunet_namestore_plugin.h
===================================================================
--- gnunet/src/include/gnunet_namestore_plugin.h 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/include/gnunet_namestore_plugin.h 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -53,12 +53,12 @@
* because the user queried for a particular record type only)
*/
typedef void (*GNUNET_NAMESTORE_RecordIterator) (void *cls,
- const struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
struct GNUNET_TIME_Absolute
expire,
const char *name,
unsigned int rd_len,
const struct
GNUNET_NAMESTORE_RecordData *rd,
- const struct
GNUNET_CRYPTO_RsaSignature *signature);
+ const struct
GNUNET_CRYPTO_EccSignature *signature);
/**
@@ -88,12 +88,12 @@
* @return GNUNET_OK on success, else GNUNET_SYSERR
*/
int (*put_records) (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_len,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature);
+ const struct GNUNET_CRYPTO_EccSignature *signature);
/**
Modified: gnunet/src/include/gnunet_namestore_service.h
===================================================================
--- gnunet/src/include/gnunet_namestore_service.h 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/include/gnunet_namestore_service.h 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -243,12 +243,12 @@
*/
struct GNUNET_NAMESTORE_QueueEntry *
GNUNET_NAMESTORE_record_put (struct GNUNET_NAMESTORE_Handle *h,
- const struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
const char *name,
struct GNUNET_TIME_Absolute freshness,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature,
+ const struct GNUNET_CRYPTO_EccSignature *signature,
GNUNET_NAMESTORE_ContinuationWithStatus cont,
void *cont_cls);
@@ -266,12 +266,12 @@
* @return GNUNET_OK if the signature is valid
*/
int
-GNUNET_NAMESTORE_verify_signature (const struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *public_key,
+GNUNET_NAMESTORE_verify_signature (const struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *public_key,
const struct GNUNET_TIME_Absolute freshness,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData
*rd,
- const struct GNUNET_CRYPTO_RsaSignature
*signature);
+ const struct GNUNET_CRYPTO_EccSignature
*signature);
/**
@@ -290,7 +290,7 @@
*/
struct GNUNET_NAMESTORE_QueueEntry *
GNUNET_NAMESTORE_record_create (struct GNUNET_NAMESTORE_Handle *h,
- const struct GNUNET_CRYPTO_RsaPrivateKey *pkey,
+ const struct GNUNET_CRYPTO_EccPrivateKey *pkey,
const char *name,
const struct GNUNET_NAMESTORE_RecordData *rd,
GNUNET_NAMESTORE_ContinuationWithStatus cont,
@@ -314,7 +314,7 @@
*/
struct GNUNET_NAMESTORE_QueueEntry *
GNUNET_NAMESTORE_record_remove (struct GNUNET_NAMESTORE_Handle *h,
- const struct GNUNET_CRYPTO_RsaPrivateKey *pkey,
+ const struct GNUNET_CRYPTO_EccPrivateKey *pkey,
const char *name,
const struct GNUNET_NAMESTORE_RecordData *rd,
GNUNET_NAMESTORE_ContinuationWithStatus cont,
@@ -338,12 +338,12 @@
* because the user queried for a particular record type only)
*/
typedef void (*GNUNET_NAMESTORE_RecordProcessor) (void *cls,
- const struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
struct GNUNET_TIME_Absolute
freshness,
const char *name,
unsigned int rd_len,
const struct
GNUNET_NAMESTORE_RecordData *rd,
- const struct
GNUNET_CRYPTO_RsaSignature *signature);
+ const struct
GNUNET_CRYPTO_EccSignature *signature);
/**
Modified: gnunet/src/namestore/gnunet-namestore.c
===================================================================
--- gnunet/src/namestore/gnunet-namestore.c 2013-05-29 08:18:40 UTC (rev
27325)
+++ gnunet/src/namestore/gnunet-namestore.c 2013-05-29 08:18:55 UTC (rev
27326)
@@ -36,7 +36,7 @@
/**
* Hostkey generation context
*/
-struct GNUNET_CRYPTO_RsaKeyGenerationContext * keygen;
+struct GNUNET_CRYPTO_EccKeyGenerationContext * keygen;
/**
* Handle to the namestore.
@@ -51,7 +51,7 @@
/**
* Private key for the our zone.
*/
-static struct GNUNET_CRYPTO_RsaPrivateKey *zone_pkey;
+static struct GNUNET_CRYPTO_EccPrivateKey *zone_pkey;
/**
* Keyfile to manipulate.
@@ -146,7 +146,7 @@
{
if (NULL != keygen)
{
- GNUNET_CRYPTO_rsa_key_create_stop (keygen);
+ GNUNET_CRYPTO_ecc_key_create_stop (keygen);
keygen = NULL;
}
@@ -177,7 +177,7 @@
}
if (NULL != zone_pkey)
{
- GNUNET_CRYPTO_rsa_key_free (zone_pkey);
+ GNUNET_CRYPTO_ecc_key_free (zone_pkey);
zone_pkey = NULL;
}
if (NULL != uri)
@@ -267,12 +267,12 @@
*/
static void
display_record (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_len,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
const char *typestring;
char *s;
@@ -328,11 +328,11 @@
static void
key_generation_cb (void *cls,
- struct GNUNET_CRYPTO_RsaPrivateKey *pk,
+ struct GNUNET_CRYPTO_EccPrivateKey *pk,
const char *emsg)
{
struct GNUNET_CONFIGURATION_Handle *cfg = cls;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pub;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pub;
uint32_t type;
void *data = NULL;
size_t data_size = 0;
@@ -354,7 +354,7 @@
/* nothing more to be done */
fprintf (stderr,
_("No options given\n"));
- GNUNET_CRYPTO_rsa_key_free (zone_pkey);
+ GNUNET_CRYPTO_ecc_key_free (zone_pkey);
zone_pkey = NULL;
return;
}
@@ -364,7 +364,7 @@
_("Failed to read or create private zone key\n"));
return;
}
- GNUNET_CRYPTO_rsa_key_get_public (zone_pkey,
+ GNUNET_CRYPTO_ecc_key_get_public (zone_pkey,
&pub);
GNUNET_CRYPTO_short_hash (&pub, sizeof (pub), &zone);
@@ -625,7 +625,7 @@
_("Using default zone file `%s'\n"),
keyfile);
}
- keygen = GNUNET_CRYPTO_rsa_key_create_start (keyfile, key_generation_cb,
cfg);
+ keygen = GNUNET_CRYPTO_ecc_key_create_start (keyfile, key_generation_cb,
cfg);
GNUNET_free (keyfile);
keyfile = NULL;
if (NULL == keygen)
Modified: gnunet/src/namestore/gnunet-service-namestore.c
===================================================================
--- gnunet/src/namestore/gnunet-service-namestore.c 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/namestore/gnunet-service-namestore.c 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -143,7 +143,7 @@
/**
* Zone's private key
*/
- struct GNUNET_CRYPTO_RsaPrivateKey *privkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *privkey;
};
@@ -205,7 +205,7 @@
{
struct KeyLoadContext *next;
struct KeyLoadContext *prev;
- struct GNUNET_CRYPTO_RsaKeyGenerationContext *keygen;
+ struct GNUNET_CRYPTO_EccKeyGenerationContext *keygen;
char *filename;
unsigned int *counter;
};
@@ -222,19 +222,19 @@
write_key_to_file (const char *filename,
struct GNUNET_NAMESTORE_CryptoContainer *c)
{
- struct GNUNET_CRYPTO_RsaPrivateKey *ret = c->privkey;
- struct GNUNET_CRYPTO_RsaPrivateKeyBinaryEncoded *enc;
+ struct GNUNET_CRYPTO_EccPrivateKey *ret = c->privkey;
+ struct GNUNET_CRYPTO_EccPrivateKeyBinaryEncoded *enc;
struct GNUNET_DISK_FileHandle *fd;
struct GNUNET_CRYPTO_ShortHashCode zone;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
- struct GNUNET_CRYPTO_RsaPrivateKey *privkey;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *privkey;
fd = GNUNET_DISK_file_open (filename,
GNUNET_DISK_OPEN_WRITE | GNUNET_DISK_OPEN_CREATE
| GNUNET_DISK_OPEN_FAILIFEXISTS,
GNUNET_DISK_PERM_USER_READ |
GNUNET_DISK_PERM_USER_WRITE);
if ( (NULL == fd) && (EEXIST == errno) )
{
- privkey = GNUNET_CRYPTO_rsa_key_create_from_file (filename);
+ privkey = GNUNET_CRYPTO_ecc_key_create_from_file (filename);
if (NULL == privkey)
{
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
@@ -243,9 +243,9 @@
_("file exists but reading key failed"));
return GNUNET_SYSERR;
}
- GNUNET_CRYPTO_rsa_key_get_public (privkey, &pubkey);
- GNUNET_CRYPTO_short_hash (&pubkey, sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded), &zone);
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_get_public (privkey, &pubkey);
+ GNUNET_CRYPTO_short_hash (&pubkey, sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded), &zone);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
if (0 == memcmp (&zone, &c->zone, sizeof(zone)))
{
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
@@ -264,17 +264,17 @@
LOG_STRERROR_FILE (GNUNET_ERROR_TYPE_ERROR, "open", filename);
return GNUNET_SYSERR;
}
- if (GNUNET_YES != GNUNET_DISK_file_lock (fd, 0, sizeof (struct
GNUNET_CRYPTO_RsaPrivateKeyBinaryEncoded), GNUNET_YES))
+ if (GNUNET_YES != GNUNET_DISK_file_lock (fd, 0, sizeof (struct
GNUNET_CRYPTO_EccPrivateKeyBinaryEncoded), GNUNET_YES))
{
GNUNET_break (GNUNET_YES == GNUNET_DISK_file_close (fd));
return GNUNET_SYSERR;
}
- enc = GNUNET_CRYPTO_rsa_encode_key (ret);
+ enc = GNUNET_CRYPTO_ecc_encode_key (ret);
GNUNET_assert (NULL != enc);
- GNUNET_assert (ntohs (enc->len) == GNUNET_DISK_file_write (fd, enc, ntohs
(enc->len)));
+ GNUNET_assert (ntohs (enc->size) == GNUNET_DISK_file_write (fd, enc, ntohs
(enc->size)));
GNUNET_free (enc);
GNUNET_DISK_file_sync (fd);
- if (GNUNET_YES != GNUNET_DISK_file_unlock (fd, 0, sizeof (struct
GNUNET_CRYPTO_RsaPrivateKeyBinaryEncoded)))
+ if (GNUNET_YES != GNUNET_DISK_file_unlock (fd, 0, sizeof (struct
GNUNET_CRYPTO_EccPrivateKeyBinaryEncoded)))
LOG_STRERROR_FILE (GNUNET_ERROR_TYPE_WARNING, "fcntl", filename);
GNUNET_assert (GNUNET_YES == GNUNET_DISK_file_close (fd));
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
@@ -308,7 +308,7 @@
GNUNET_short_h2s (&c->zone));
(void) write_key_to_file(c->filename, c);
GNUNET_assert (GNUNET_OK == GNUNET_CONTAINER_multihashmap_remove (zonekeys,
key, value));
- GNUNET_CRYPTO_rsa_key_free (c->privkey);
+ GNUNET_CRYPTO_ecc_key_free (c->privkey);
GNUNET_free (c->filename);
GNUNET_free (c);
return GNUNET_OK;
@@ -323,22 +323,22 @@
* be taken over or freed and should not be used afterwards)
*/
static void
-learn_private_key (struct GNUNET_CRYPTO_RsaPrivateKey *pkey)
+learn_private_key (struct GNUNET_CRYPTO_EccPrivateKey *pkey)
{
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pub;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pub;
struct GNUNET_HashCode long_hash;
struct GNUNET_CRYPTO_ShortHashCode pubkey_hash;
struct GNUNET_NAMESTORE_CryptoContainer *cc;
- GNUNET_CRYPTO_rsa_key_get_public (pkey, &pub);
+ GNUNET_CRYPTO_ecc_key_get_public (pkey, &pub);
GNUNET_CRYPTO_short_hash (&pub,
- sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&pubkey_hash);
GNUNET_CRYPTO_short_hash_double (&pubkey_hash, &long_hash);
if (GNUNET_NO != GNUNET_CONTAINER_multihashmap_contains(zonekeys,
&long_hash))
{
- GNUNET_CRYPTO_rsa_key_free (pkey);
+ GNUNET_CRYPTO_ecc_key_free (pkey);
return;
}
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
@@ -414,7 +414,7 @@
{
GNUNET_CONTAINER_DLL_remove (kl_head, kl_tail, kl);
if (NULL != kl->keygen)
- GNUNET_CRYPTO_rsa_key_create_stop (kl->keygen);
+ GNUNET_CRYPTO_ecc_key_create_stop (kl->keygen);
GNUNET_free (kl->filename);
GNUNET_free (kl);
}
@@ -570,18 +570,18 @@
*/
static void
handle_lookup_name_it (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
struct LookupNameContext *lnc = cls;
struct LookupNameResponseMessage *lnr_msg;
struct GNUNET_NAMESTORE_RecordData *rd_selected;
struct GNUNET_NAMESTORE_CryptoContainer *cc;
- struct GNUNET_CRYPTO_RsaSignature *signature_new;
+ struct GNUNET_CRYPTO_EccSignature *signature_new;
struct GNUNET_TIME_Absolute e;
struct GNUNET_TIME_Relative re;
struct GNUNET_CRYPTO_ShortHashCode zone_key_hash;
@@ -607,7 +607,7 @@
if (NULL != zone_key)
{
GNUNET_CRYPTO_short_hash (zone_key,
- sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&zone_key_hash);
GNUNET_CRYPTO_short_hash_double (&zone_key_hash, &long_hash);
if (NULL != (cc = GNUNET_CONTAINER_multihashmap_get (zonekeys,
&long_hash)))
@@ -728,7 +728,7 @@
rd_ser_len = GNUNET_NAMESTORE_records_get_size (copied_elements,
rd_selected);
name_len = (NULL == name) ? 0 : strlen(name) + 1;
r_size = sizeof (struct LookupNameResponseMessage) +
- sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded) +
+ sizeof (struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded) +
name_len +
rd_ser_len;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
@@ -885,7 +885,7 @@
struct GNUNET_NAMESTORE_Client *nc;
const struct RecordPutMessage *rp_msg;
struct GNUNET_TIME_Absolute expire;
- const struct GNUNET_CRYPTO_RsaSignature *signature;
+ const struct GNUNET_CRYPTO_EccSignature *signature;
struct RecordPutResponseMessage rpr_msg;
struct GNUNET_CRYPTO_ShortHashCode zone_hash;
size_t name_len;
@@ -1008,7 +1008,7 @@
/**
* Zone's public key
*/
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey;
/**
* Name for the record to create
@@ -1044,14 +1044,14 @@
*/
static void
handle_create_record_it (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*pubkey,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*pubkey,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
- static struct GNUNET_CRYPTO_RsaSignature dummy_signature;
+ static struct GNUNET_CRYPTO_EccSignature dummy_signature;
struct CreateRecordContext *crc = cls;
struct GNUNET_NAMESTORE_RecordData *rd_new;
struct GNUNET_TIME_Absolute block_expiration;
@@ -1159,7 +1159,7 @@
struct GNUNET_NAMESTORE_Client *nc;
const struct RecordCreateMessage *rp_msg;
struct CreateRecordContext crc;
- struct GNUNET_CRYPTO_RsaPrivateKey *pkey;
+ struct GNUNET_CRYPTO_EccPrivateKey *pkey;
struct RecordCreateResponseMessage rcr_msg;
size_t name_len;
size_t msg_size;
@@ -1219,7 +1219,8 @@
GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
return;
}
- if (NULL == (pkey = GNUNET_CRYPTO_rsa_decode_key (pkey_tmp, key_len)))
+ if (NULL == (pkey = GNUNET_CRYPTO_ecc_decode_key (pkey_tmp, key_len,
+ GNUNET_NO)))
{
GNUNET_break (0);
GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
@@ -1229,15 +1230,15 @@
GNUNET_NAMESTORE_records_deserialize (rd_ser_len, rd_ser, rd_count, &rd))
{
GNUNET_break (0);
- GNUNET_CRYPTO_rsa_key_free (pkey);
+ GNUNET_CRYPTO_ecc_key_free (pkey);
GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
return;
}
/* Extracting and converting private key */
- GNUNET_CRYPTO_rsa_key_get_public (pkey, &crc.pubkey);
+ GNUNET_CRYPTO_ecc_key_get_public (pkey, &crc.pubkey);
GNUNET_CRYPTO_short_hash (&crc.pubkey,
- sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&pubkey_hash);
learn_private_key (pkey);
@@ -1318,14 +1319,14 @@
*/
static void
handle_record_remove_it (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
- static struct GNUNET_CRYPTO_RsaSignature dummy_signature;
+ static struct GNUNET_CRYPTO_EccSignature dummy_signature;
struct RemoveRecordContext *rrc = cls;
unsigned int c;
int found;
@@ -1364,7 +1365,7 @@
"No records left for name `%s', removing name\n",
name);
GNUNET_CRYPTO_short_hash (zone_key,
- sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&pubkey_hash);
if (GNUNET_OK !=
GSN_database->remove_records (GSN_database->cls,
@@ -1421,8 +1422,8 @@
struct GNUNET_NAMESTORE_Client *nc;
const struct RecordRemoveMessage *rr_msg;
struct RecordRemoveResponseMessage rrr_msg;
- struct GNUNET_CRYPTO_RsaPrivateKey *pkey;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pub;
+ struct GNUNET_CRYPTO_EccPrivateKey *pkey;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pub;
struct GNUNET_CRYPTO_ShortHashCode pubkey_hash;
struct GNUNET_NAMESTORE_RecordData rd;
const char *pkey_tmp;
@@ -1484,15 +1485,16 @@
GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
return;
}
- if (NULL == (pkey = GNUNET_CRYPTO_rsa_decode_key (pkey_tmp, key_len)))
+ if (NULL == (pkey = GNUNET_CRYPTO_ecc_decode_key (pkey_tmp, key_len,
+ GNUNET_NO)))
{
GNUNET_break (0);
GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
return;
}
- GNUNET_CRYPTO_rsa_key_get_public (pkey, &pub);
+ GNUNET_CRYPTO_ecc_key_get_public (pkey, &pub);
GNUNET_CRYPTO_short_hash (&pub,
- sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&pubkey_hash);
learn_private_key (pkey);
if (GNUNET_OK !=
@@ -1618,12 +1620,12 @@
*/
static void
handle_zone_to_name_it (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
struct ZoneToNameCtx *ztn_ctx = cls;
struct ZoneToNameResponseMessage *ztnr_msg;
@@ -1658,7 +1660,7 @@
rd_ser_len = GNUNET_NAMESTORE_records_get_size (rd_count, rd);
msg_size = sizeof (struct ZoneToNameResponseMessage) + name_len + rd_ser_len;
if (NULL != signature)
- msg_size += sizeof (struct GNUNET_CRYPTO_RsaSignature);
+ msg_size += sizeof (struct GNUNET_CRYPTO_EccSignature);
if (msg_size >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
{
GNUNET_break (0);
@@ -1683,7 +1685,7 @@
GNUNET_NAMESTORE_records_serialize (rd_count, rd, rd_ser_len, rd_tmp);
sig_tmp = &rd_tmp[rd_ser_len];
if (NULL != signature)
- memcpy (sig_tmp, signature, sizeof (struct GNUNET_CRYPTO_RsaSignature));
+ memcpy (sig_tmp, signature, sizeof (struct GNUNET_CRYPTO_EccSignature));
ztn_ctx->success = GNUNET_OK;
GNUNET_SERVER_notification_context_unicast (snc, ztn_ctx->nc->client,
&ztnr_msg->gns_header.header,
@@ -1797,16 +1799,16 @@
*/
static void
zone_iteraterate_proc (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
struct ZoneIterationProcResult *proc = cls;
struct GNUNET_NAMESTORE_RecordData rd_filtered[rd_count];
- struct GNUNET_CRYPTO_RsaSignature *new_signature = NULL;
+ struct GNUNET_CRYPTO_EccSignature *new_signature = NULL;
struct GNUNET_NAMESTORE_CryptoContainer *cc;
struct GNUNET_HashCode long_hash;
struct GNUNET_CRYPTO_ShortHashCode zone_hash;
@@ -1884,7 +1886,7 @@
/* compute / obtain signature, but only if we (a) have records and (b)
expiration times were
converted to absolute expiration times */
GNUNET_CRYPTO_short_hash (zone_key,
- sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&zone_hash);
GNUNET_CRYPTO_short_hash_double (&zone_hash, &long_hash);
if (NULL != (cc = GNUNET_CONTAINER_multihashmap_get(zonekeys, &long_hash)))
@@ -2160,7 +2162,7 @@
static void
zonekey_it_key_cb (void *cls,
- struct GNUNET_CRYPTO_RsaPrivateKey *pk,
+ struct GNUNET_CRYPTO_EccPrivateKey *pk,
const char *emsg)
{
struct KeyLoadContext *kl = cls;
@@ -2201,7 +2203,7 @@
kl = GNUNET_malloc (sizeof (struct KeyLoadContext));
kl->filename = strdup (filename);
kl->counter = cls;
- kl->keygen = GNUNET_CRYPTO_rsa_key_create_start (filename,
zonekey_it_key_cb, kl);
+ kl->keygen = GNUNET_CRYPTO_ecc_key_create_start (filename,
zonekey_it_key_cb, kl);
if (NULL == kl->keygen)
{
GNUNET_free (kl->filename);
Modified: gnunet/src/namestore/namestore.h
===================================================================
--- gnunet/src/namestore/namestore.h 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/namestore/namestore.h 2013-05-29 08:18:55 UTC (rev 27326)
@@ -62,8 +62,8 @@
*
* @return the signature
*/
-struct GNUNET_CRYPTO_RsaSignature *
-GNUNET_NAMESTORE_create_signature (const struct GNUNET_CRYPTO_RsaPrivateKey
*key,
+struct GNUNET_CRYPTO_EccSignature *
+GNUNET_NAMESTORE_create_signature (const struct GNUNET_CRYPTO_EccPrivateKey
*key,
struct GNUNET_TIME_Absolute expire,
const char *name,
const struct GNUNET_NAMESTORE_RecordData *rd,
@@ -212,12 +212,12 @@
/**
* All zeros if 'contains_sig' is GNUNET_NO.
*/
- struct GNUNET_CRYPTO_RsaSignature signature;
+ struct GNUNET_CRYPTO_EccSignature signature;
/**
* The public key for the name
*/
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded public_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded public_key;
/* 0-terminated name and serialized record data */
/* rd_len bytes serialized record data */
@@ -262,12 +262,12 @@
/**
* The signature
*/
- struct GNUNET_CRYPTO_RsaSignature signature;
+ struct GNUNET_CRYPTO_EccSignature signature;
/**
* The public key
*/
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded public_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded public_key;
/* name (0-terminated) followed by "rd_count" serialized records */
@@ -327,7 +327,7 @@
uint16_t pkey_len;
/* followed by:
- * GNUNET_CRYPTO_RsaPrivateKeyBinaryEncoded private key with length pkey_len
+ * GNUNET_CRYPTO_EccPrivateKeyBinaryEncoded private key with length pkey_len
* name with length name_len
* serialized record data with length rd_len
* */
@@ -383,7 +383,7 @@
uint16_t pkey_len;
/* followed by:
- * GNUNET_CRYPTO_RsaPrivateKeyBinaryEncoded private key with length pkey_len
+ * GNUNET_CRYPTO_EccPrivateKeyBinaryEncoded private key with length pkey_len
* name with length name_len
* serialized record data with length rd_len
* */
@@ -507,12 +507,12 @@
/**
* Signature
*/
- struct GNUNET_CRYPTO_RsaSignature signature;
+ struct GNUNET_CRYPTO_EccSignature signature;
/**
* Publik key
*/
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded zone_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded zone_key;
};
@@ -600,12 +600,12 @@
/**
* All zeros if 'contains_sig' is GNUNET_NO.
*/
- struct GNUNET_CRYPTO_RsaSignature signature;
+ struct GNUNET_CRYPTO_EccSignature signature;
/**
* The public key
*/
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded public_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded public_key;
Modified: gnunet/src/namestore/namestore_api.c
===================================================================
--- gnunet/src/namestore/namestore_api.c 2013-05-29 08:18:40 UTC (rev
27325)
+++ gnunet/src/namestore/namestore_api.c 2013-05-29 08:18:55 UTC (rev
27326)
@@ -264,9 +264,9 @@
{
const char *name;
const char * rd_tmp;
- const struct GNUNET_CRYPTO_RsaSignature *signature;
+ const struct GNUNET_CRYPTO_EccSignature *signature;
struct GNUNET_TIME_Absolute expire;
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *public_key_tmp;
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *public_key_tmp;
size_t exp_msg_len;
size_t msg_len;
size_t name_len;
@@ -282,7 +282,7 @@
contains_sig = ntohs (msg->contains_sig);
expire = GNUNET_TIME_absolute_ntoh (msg->expire);
exp_msg_len = sizeof (struct LookupNameResponseMessage) +
- sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded) +
+ sizeof (struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded) +
name_len + rd_len;
if (msg_len != exp_msg_len)
{
@@ -589,7 +589,7 @@
const struct ZoneIterationResponseMessage *msg,
size_t size)
{
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubdummy;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubdummy;
size_t msg_len;
size_t exp_msg_len;
size_t name_len;
@@ -1003,12 +1003,12 @@
*/
struct GNUNET_NAMESTORE_QueueEntry *
GNUNET_NAMESTORE_record_put (struct GNUNET_NAMESTORE_Handle *h,
- const struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
const char *name,
struct GNUNET_TIME_Absolute freshness,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature,
+ const struct GNUNET_CRYPTO_EccSignature *signature,
GNUNET_NAMESTORE_ContinuationWithStatus cont,
void *cont_cls)
{
@@ -1088,18 +1088,18 @@
* @return GNUNET_OK if the signature is valid
*/
int
-GNUNET_NAMESTORE_verify_signature (const struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *public_key,
+GNUNET_NAMESTORE_verify_signature (const struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *public_key,
const struct GNUNET_TIME_Absolute freshness,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature
*signature)
+ const struct GNUNET_CRYPTO_EccSignature
*signature)
{
size_t rd_ser_len;
size_t name_len;
char *name_tmp;
char *rd_ser;
- struct GNUNET_CRYPTO_RsaSignaturePurpose *sig_purpose;
+ struct GNUNET_CRYPTO_EccSignaturePurpose *sig_purpose;
struct GNUNET_TIME_AbsoluteNBO *expire_tmp;
struct GNUNET_TIME_AbsoluteNBO expire_nbo = GNUNET_TIME_absolute_hton
(freshness);
uint32_t sig_len;
@@ -1115,11 +1115,11 @@
return GNUNET_SYSERR;
}
rd_ser_len = GNUNET_NAMESTORE_records_get_size (rd_count, rd);
- sig_len = sizeof (struct GNUNET_CRYPTO_RsaSignaturePurpose) + sizeof (struct
GNUNET_TIME_AbsoluteNBO) + rd_ser_len + name_len;
+ sig_len = sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose) + sizeof (struct
GNUNET_TIME_AbsoluteNBO) + rd_ser_len + name_len;
{
char sig_buf[sig_len] GNUNET_ALIGN;
- sig_purpose = (struct GNUNET_CRYPTO_RsaSignaturePurpose *) sig_buf;
+ sig_purpose = (struct GNUNET_CRYPTO_EccSignaturePurpose *) sig_buf;
sig_purpose->size = htonl (sig_len);
sig_purpose->purpose = htonl (GNUNET_SIGNATURE_PURPOSE_GNS_RECORD_SIGN);
expire_tmp = (struct GNUNET_TIME_AbsoluteNBO *) &sig_purpose[1];
@@ -1129,7 +1129,7 @@
rd_ser = &name_tmp[name_len];
GNUNET_assert (rd_ser_len ==
GNUNET_NAMESTORE_records_serialize (rd_count, rd,
rd_ser_len, rd_ser));
- return GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_GNS_RECORD_SIGN,
sig_purpose, signature, public_key);
+ return GNUNET_CRYPTO_ecc_verify (GNUNET_SIGNATURE_PURPOSE_GNS_RECORD_SIGN,
sig_purpose, signature, public_key);
}
}
@@ -1149,7 +1149,7 @@
*/
struct GNUNET_NAMESTORE_QueueEntry *
GNUNET_NAMESTORE_record_create (struct GNUNET_NAMESTORE_Handle *h,
- const struct GNUNET_CRYPTO_RsaPrivateKey *pkey,
+ const struct GNUNET_CRYPTO_EccPrivateKey *pkey,
const char *name,
const struct GNUNET_NAMESTORE_RecordData *rd,
GNUNET_NAMESTORE_ContinuationWithStatus cont,
@@ -1166,7 +1166,7 @@
size_t key_len;
uint32_t rid;
struct RecordCreateMessage * msg;
- struct GNUNET_CRYPTO_RsaPrivateKeyBinaryEncoded * pkey_enc;
+ struct GNUNET_CRYPTO_EccPrivateKeyBinaryEncoded * pkey_enc;
GNUNET_assert (NULL != h);
GNUNET_assert (NULL != pkey);
@@ -1190,11 +1190,11 @@
qe->op_id = rid;
GNUNET_CONTAINER_DLL_insert_tail (h->op_head, h->op_tail, qe);
- pkey_enc = GNUNET_CRYPTO_rsa_encode_key (pkey);
+ pkey_enc = GNUNET_CRYPTO_ecc_encode_key (pkey);
GNUNET_assert (NULL != pkey_enc);
/* setup msg */
- key_len = ntohs (pkey_enc->len);
+ key_len = ntohs (pkey_enc->size);
rd_ser_len = GNUNET_NAMESTORE_records_get_size(1, rd);
msg_size = sizeof (struct RecordCreateMessage) + key_len + name_len +
rd_ser_len;
pe = GNUNET_malloc(sizeof (struct PendingMessage) + msg_size);
@@ -1244,14 +1244,14 @@
*/
struct GNUNET_NAMESTORE_QueueEntry *
GNUNET_NAMESTORE_record_remove (struct GNUNET_NAMESTORE_Handle *h,
- const struct GNUNET_CRYPTO_RsaPrivateKey *pkey,
+ const struct GNUNET_CRYPTO_EccPrivateKey *pkey,
const char *name,
const struct GNUNET_NAMESTORE_RecordData *rd,
GNUNET_NAMESTORE_ContinuationWithStatus cont,
void *cont_cls)
{
struct GNUNET_NAMESTORE_QueueEntry *qe;
- struct GNUNET_CRYPTO_RsaPrivateKeyBinaryEncoded * pkey_enc;
+ struct GNUNET_CRYPTO_EccPrivateKeyBinaryEncoded *pkey_enc;
struct PendingMessage *pe;
struct RecordRemoveMessage * msg;
char *pkey_tmp;
@@ -1282,15 +1282,15 @@
qe->op_id = rid;
GNUNET_CONTAINER_DLL_insert_tail (h->op_head, h->op_tail, qe);
- pkey_enc = GNUNET_CRYPTO_rsa_encode_key (pkey);
+ pkey_enc = GNUNET_CRYPTO_ecc_encode_key (pkey);
GNUNET_assert (NULL != pkey_enc);
- key_len = ntohs (pkey_enc->len);
+ key_len = ntohs (pkey_enc->size);
rd_count = (NULL == rd) ? 0 : 1;
rd_ser_len = GNUNET_NAMESTORE_records_get_size (rd_count, rd);
name_len = strlen (name) + 1;
msg_size = sizeof (struct RecordRemoveMessage) + key_len + name_len +
rd_ser_len;
- pe = GNUNET_malloc(sizeof (struct PendingMessage) + msg_size);
+ pe = GNUNET_malloc (sizeof (struct PendingMessage) + msg_size);
pe->size = msg_size;
pe->is_init = GNUNET_NO;
msg = (struct RecordRemoveMessage *) &pe[1];
Modified: gnunet/src/namestore/namestore_common.c
===================================================================
--- gnunet/src/namestore/namestore_common.c 2013-05-29 08:18:40 UTC (rev
27325)
+++ gnunet/src/namestore/namestore_common.c 2013-05-29 08:18:55 UTC (rev
27326)
@@ -279,15 +279,15 @@
*
* @return the signature
*/
-struct GNUNET_CRYPTO_RsaSignature *
-GNUNET_NAMESTORE_create_signature (const struct GNUNET_CRYPTO_RsaPrivateKey
*key,
+struct GNUNET_CRYPTO_EccSignature *
+GNUNET_NAMESTORE_create_signature (const struct GNUNET_CRYPTO_EccPrivateKey
*key,
struct GNUNET_TIME_Absolute expire,
const char *name,
const struct GNUNET_NAMESTORE_RecordData *rd,
unsigned int rd_count)
{
- struct GNUNET_CRYPTO_RsaSignature *sig;
- struct GNUNET_CRYPTO_RsaSignaturePurpose *sig_purpose;
+ struct GNUNET_CRYPTO_EccSignature *sig;
+ struct GNUNET_CRYPTO_EccSignaturePurpose *sig_purpose;
struct GNUNET_TIME_AbsoluteNBO expire_nbo;
size_t rd_ser_len;
size_t name_len;
@@ -302,7 +302,7 @@
GNUNET_break (0);
return NULL;
}
- sig = GNUNET_malloc (sizeof (struct GNUNET_CRYPTO_RsaSignature));
+ sig = GNUNET_malloc (sizeof (struct GNUNET_CRYPTO_EccSignature));
name_len = strlen (name) + 1;
expire_nbo = GNUNET_TIME_absolute_hton (expire);
rd_ser_len = GNUNET_NAMESTORE_records_get_size (rd_count, rd);
@@ -311,7 +311,7 @@
GNUNET_assert (rd_ser_len ==
GNUNET_NAMESTORE_records_serialize (rd_count, rd,
rd_ser_len, rd_ser));
- sig_len = sizeof (struct GNUNET_CRYPTO_RsaSignaturePurpose) + sizeof
(struct GNUNET_TIME_AbsoluteNBO) + rd_ser_len + name_len;
+ sig_len = sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose) + sizeof
(struct GNUNET_TIME_AbsoluteNBO) + rd_ser_len + name_len;
sig_purpose = GNUNET_malloc (sig_len);
sig_purpose->size = htonl (sig_len);
sig_purpose->purpose = htonl (GNUNET_SIGNATURE_PURPOSE_GNS_RECORD_SIGN);
@@ -321,7 +321,7 @@
memcpy (name_tmp, name, name_len);
rd_tmp = &name_tmp[name_len];
memcpy (rd_tmp, rd_ser, rd_ser_len);
- res = GNUNET_CRYPTO_rsa_sign (key, sig_purpose, sig);
+ res = GNUNET_CRYPTO_ecc_sign (key, sig_purpose, sig);
GNUNET_free (sig_purpose);
}
if (GNUNET_OK != res)
Modified: gnunet/src/namestore/plugin_namestore_postgres.c
===================================================================
--- gnunet/src/namestore/plugin_namestore_postgres.c 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/namestore/plugin_namestore_postgres.c 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -269,12 +269,12 @@
*/
static int
namestore_postgres_put_records (void *cls,
- const struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature
*signature)
+ const struct GNUNET_CRYPTO_EccSignature
*signature)
{
struct Plugin *plugin = cls;
PGresult *ret;
@@ -287,7 +287,7 @@
unsigned int i;
GNUNET_CRYPTO_short_hash (zone_key,
- sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&zone);
(void) namestore_postgres_remove_records (plugin, &zone, name);
name_len = strlen (name);
@@ -327,12 +327,12 @@
(const char *) &rvalue_be
};
int paramLengths[] = {
- sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof (struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
name_len,
sizeof (uint32_t),
data_size,
sizeof (uint64_t),
- sizeof (struct GNUNET_CRYPTO_RsaSignature),
+ sizeof (struct GNUNET_CRYPTO_EccSignature),
sizeof (struct GNUNET_CRYPTO_ShortHashCode),
sizeof (struct GNUNET_CRYPTO_ShortHashCode),
sizeof (struct GNUNET_CRYPTO_ShortHashCode),
@@ -378,8 +378,8 @@
{
unsigned int record_count;
size_t data_size;
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key;
- const struct GNUNET_CRYPTO_RsaSignature *sig;
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key;
+ const struct GNUNET_CRYPTO_EccSignature *sig;
struct GNUNET_TIME_Absolute expiration;
const char *data;
const char *name;
@@ -406,16 +406,16 @@
}
GNUNET_assert (1 == cnt);
if ((6 != PQnfields (res)) ||
- (sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded) != PQgetlength
(res, 0, 0)) ||
+ (sizeof (struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded) != PQgetlength
(res, 0, 0)) ||
(sizeof (uint32_t) != PQfsize (res, 2)) ||
(sizeof (uint64_t) != PQfsize (res, 4)) ||
- (sizeof (struct GNUNET_CRYPTO_RsaSignature) != PQgetlength (res, 0, 5)))
+ (sizeof (struct GNUNET_CRYPTO_EccSignature) != PQgetlength (res, 0, 5)))
{
GNUNET_break (0);
PQclear (res);
return GNUNET_SYSERR;
}
- zone_key = (const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *)
PQgetvalue (res, 0, 0);
+ zone_key = (const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *)
PQgetvalue (res, 0, 0);
name = PQgetvalue (res, 0, 1);
name_len = PQgetlength (res, 0, 1);
record_count = ntohl (*(uint32_t *) PQgetvalue (res, 0, 2));
@@ -423,7 +423,7 @@
data = PQgetvalue (res, 0, 3);
expiration.abs_value =
GNUNET_ntohll (*(uint64_t *) PQgetvalue (res, 0, 4));
- sig = (const struct GNUNET_CRYPTO_RsaSignature*) PQgetvalue (res, 0, 5);
+ sig = (const struct GNUNET_CRYPTO_EccSignature*) PQgetvalue (res, 0, 5);
if (record_count > 64 * 1024)
{
/* sanity check, don't stack allocate far too much just
Modified: gnunet/src/namestore/plugin_namestore_sqlite.c
===================================================================
--- gnunet/src/namestore/plugin_namestore_sqlite.c 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/namestore/plugin_namestore_sqlite.c 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -450,12 +450,12 @@
*/
static int
namestore_sqlite_put_records (void *cls,
- const struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature
*signature)
+ const struct GNUNET_CRYPTO_EccSignature
*signature)
{
struct Plugin *plugin = cls;
int n;
@@ -467,7 +467,7 @@
size_t data_size;
unsigned int i;
- GNUNET_CRYPTO_short_hash (zone_key, sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded), &zone);
+ GNUNET_CRYPTO_short_hash (zone_key, sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded), &zone);
(void) namestore_sqlite_remove_records (plugin, &zone, name);
name_len = strlen (name);
GNUNET_CRYPTO_short_hash (name, name_len, &nh);
@@ -497,12 +497,12 @@
GNUNET_break (0);
return GNUNET_SYSERR;
}
- if ((SQLITE_OK != sqlite3_bind_blob (plugin->put_records, 1, zone_key,
sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded), SQLITE_STATIC)) ||
+ if ((SQLITE_OK != sqlite3_bind_blob (plugin->put_records, 1, zone_key,
sizeof (struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded), SQLITE_STATIC)) ||
(SQLITE_OK != sqlite3_bind_text (plugin->put_records, 2, name, -1,
SQLITE_STATIC)) ||
(SQLITE_OK != sqlite3_bind_int (plugin->put_records, 3, rd_count)) ||
(SQLITE_OK != sqlite3_bind_blob (plugin->put_records, 4, data,
data_size, SQLITE_STATIC)) ||
(SQLITE_OK != sqlite3_bind_int64 (plugin->put_records, 5,
expire.abs_value)) ||
- (SQLITE_OK != sqlite3_bind_blob (plugin->put_records, 6, signature,
sizeof (struct GNUNET_CRYPTO_RsaSignature), SQLITE_STATIC)) ||
+ (SQLITE_OK != sqlite3_bind_blob (plugin->put_records, 6, signature,
sizeof (struct GNUNET_CRYPTO_EccSignature), SQLITE_STATIC)) ||
(SQLITE_OK != sqlite3_bind_blob (plugin->put_records, 7,
&zone_delegation, sizeof (struct GNUNET_CRYPTO_ShortHashCode), SQLITE_STATIC))
||
(SQLITE_OK != sqlite3_bind_blob (plugin->put_records, 8, &zone, sizeof
(struct GNUNET_CRYPTO_ShortHashCode), SQLITE_STATIC)) ||
(SQLITE_OK != sqlite3_bind_blob (plugin->put_records, 9, &nh, sizeof
(struct GNUNET_CRYPTO_ShortHashCode), SQLITE_STATIC)) ||
@@ -560,8 +560,8 @@
int sret;
unsigned int record_count;
size_t data_size;
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key;
- const struct GNUNET_CRYPTO_RsaSignature *sig;
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key;
+ const struct GNUNET_CRYPTO_EccSignature *sig;
struct GNUNET_TIME_Absolute expiration;
const char *data;
const char *name;
@@ -578,8 +578,8 @@
expiration.abs_value = (uint64_t) sqlite3_column_int64 (stmt, 4);
sig = sqlite3_column_blob (stmt, 5);
- if ( (sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded) !=
sqlite3_column_bytes (stmt, 0)) ||
- (sizeof (struct GNUNET_CRYPTO_RsaSignature) != sqlite3_column_bytes
(stmt, 5)) )
+ if ( (sizeof (struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded) !=
sqlite3_column_bytes (stmt, 0)) ||
+ (sizeof (struct GNUNET_CRYPTO_EccSignature) != sqlite3_column_bytes
(stmt, 5)) )
{
GNUNET_break (0);
ret = GNUNET_SYSERR;
Modified: gnunet/src/namestore/test_namestore_api.c
===================================================================
--- gnunet/src/namestore/test_namestore_api.c 2013-05-29 08:18:40 UTC (rev
27325)
+++ gnunet/src/namestore/test_namestore_api.c 2013-05-29 08:18:55 UTC (rev
27326)
@@ -39,9 +39,9 @@
static GNUNET_SCHEDULER_TaskIdentifier endbadly_task;
-static struct GNUNET_CRYPTO_RsaPrivateKey *privkey;
+static struct GNUNET_CRYPTO_EccPrivateKey *privkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey;
static struct GNUNET_CRYPTO_ShortHashCode zone;
@@ -60,7 +60,7 @@
}
if (NULL != privkey)
{
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
}
GNUNET_SCHEDULER_shutdown ();
@@ -96,12 +96,12 @@
static void
name_lookup_proc (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
nsqe = NULL;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
@@ -135,7 +135,7 @@
const struct GNUNET_CONFIGURATION_Handle *cfg,
struct GNUNET_TESTING_Peer *peer)
{
- struct GNUNET_CRYPTO_RsaSignature signature;
+ struct GNUNET_CRYPTO_EccSignature signature;
struct GNUNET_NAMESTORE_RecordData rd;
char *hostkey_file;
const char * name = "dummy.dummy.gnunet";
@@ -147,10 +147,10 @@
DIR_SEPARATOR_STR,
"N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n",
hostkey_file);
- privkey = GNUNET_CRYPTO_rsa_key_create_from_file (hostkey_file);
+ privkey = GNUNET_CRYPTO_ecc_key_create_from_file (hostkey_file);
GNUNET_free (hostkey_file);
GNUNET_assert (privkey != NULL);
- GNUNET_CRYPTO_rsa_key_get_public (privkey, &pubkey);
+ GNUNET_CRYPTO_ecc_key_get_public (privkey, &pubkey);
GNUNET_CRYPTO_short_hash (&pubkey, sizeof (pubkey), &zone);
memset (&signature, '\0', sizeof (signature));
rd.expiration_time = GNUNET_TIME_absolute_get().abs_value;
Modified: gnunet/src/namestore/test_namestore_api_create.c
===================================================================
--- gnunet/src/namestore/test_namestore_api_create.c 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/namestore/test_namestore_api_create.c 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -50,13 +50,13 @@
static GNUNET_SCHEDULER_TaskIdentifier endbadly_task;
-static struct GNUNET_CRYPTO_RsaPrivateKey * privkey;
+static struct GNUNET_CRYPTO_EccPrivateKey * privkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey;
-static struct GNUNET_CRYPTO_RsaSignature *s_signature;
+static struct GNUNET_CRYPTO_EccSignature *s_signature;
-static struct GNUNET_CRYPTO_RsaSignature *s_signature_updated;
+static struct GNUNET_CRYPTO_EccSignature *s_signature_updated;
static struct GNUNET_CRYPTO_ShortHashCode s_zone;
@@ -82,7 +82,7 @@
GNUNET_NAMESTORE_disconnect (nsh);
nsh = NULL;
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
GNUNET_free_non_null (s_name);
res = 1;
@@ -102,7 +102,7 @@
GNUNET_free_non_null (s_second_record);
GNUNET_free_non_null (s_name);
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
if (nsh != NULL)
GNUNET_NAMESTORE_disconnect (nsh);
@@ -112,12 +112,12 @@
static void
name_lookup_second_proc (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *n,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
static int found = GNUNET_NO;
int failed = GNUNET_NO;
@@ -126,7 +126,7 @@
if (n != NULL)
{
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Checking returned results\n");
- if (0 != memcmp (zone_key, &pubkey, sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded)))
+ if (0 != memcmp (zone_key, &pubkey, sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded)))
{
GNUNET_break (0);
failed = GNUNET_YES;
@@ -172,7 +172,7 @@
rd_new[1].flags = 0; /* unset GNUNET_NAMESTORE_RF_AUTHORITY */
s_signature_updated = GNUNET_NAMESTORE_create_signature (privkey, expire,
s_name, rd_new, 2);
- if (0 != memcmp (s_signature_updated, signature, sizeof (struct
GNUNET_CRYPTO_RsaSignature)))
+ if (0 != memcmp (s_signature_updated, signature, sizeof (struct
GNUNET_CRYPTO_EccSignature)))
{
GNUNET_break (0);
failed = GNUNET_YES;
@@ -219,12 +219,12 @@
static void
name_lookup_initial_proc (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *n,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
char * name = cls;
static int found = GNUNET_NO;
@@ -234,7 +234,7 @@
if (n != NULL)
{
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Checking returned results\n");
- if (0 != memcmp (zone_key, &pubkey, sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded)))
+ if (0 != memcmp (zone_key, &pubkey, sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded)))
{
GNUNET_break (0);
failed = GNUNET_YES;
@@ -267,7 +267,7 @@
failed = GNUNET_YES;
}
- if (0 != memcmp (s_signature, signature, sizeof (struct
GNUNET_CRYPTO_RsaSignature)))
+ if (0 != memcmp (s_signature, signature, sizeof (struct
GNUNET_CRYPTO_EccSignature)))
{
GNUNET_break (0);
failed = GNUNET_YES;
@@ -357,10 +357,10 @@
GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR,
"N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n",
hostkey_file);
- privkey = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
+ privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file);
GNUNET_free (hostkey_file);
/* get public key */
- GNUNET_CRYPTO_rsa_key_get_public(privkey, &pubkey);
+ GNUNET_CRYPTO_ecc_key_get_public(privkey, &pubkey);
/* create record */
s_name = GNUNET_NAMESTORE_normalize_string ("DUMMY.dummy.gnunet");
@@ -373,7 +373,7 @@
s_signature = GNUNET_NAMESTORE_create_signature(privkey, et, s_name,
s_first_record, 1);
/* create random zone hash */
- GNUNET_CRYPTO_short_hash (&pubkey, sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded), &s_zone);
+ GNUNET_CRYPTO_short_hash (&pubkey, sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded), &s_zone);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Name: `%s' Zone: `%s' \n", s_name,
GNUNET_short_h2s (&s_zone));
nsh = GNUNET_NAMESTORE_connect (cfg);
Modified: gnunet/src/namestore/test_namestore_api_create_update.c
===================================================================
--- gnunet/src/namestore/test_namestore_api_create_update.c 2013-05-29
08:18:40 UTC (rev 27325)
+++ gnunet/src/namestore/test_namestore_api_create_update.c 2013-05-29
08:18:55 UTC (rev 27326)
@@ -50,11 +50,11 @@
static GNUNET_SCHEDULER_TaskIdentifier endbadly_task;
-static struct GNUNET_CRYPTO_RsaPrivateKey * privkey;
+static struct GNUNET_CRYPTO_EccPrivateKey * privkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey;
-static struct GNUNET_CRYPTO_RsaSignature *s_signature;
+static struct GNUNET_CRYPTO_EccSignature *s_signature;
static struct GNUNET_CRYPTO_ShortHashCode s_zone;
@@ -80,7 +80,7 @@
GNUNET_NAMESTORE_disconnect (nsh);
nsh = NULL;
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
GNUNET_free_non_null (s_name);
res = 1;
@@ -99,7 +99,7 @@
GNUNET_free (s_first_record);
GNUNET_free_non_null (s_second_record);
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
if (nsh != NULL)
GNUNET_NAMESTORE_disconnect (nsh);
@@ -208,11 +208,11 @@
GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR,
"N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n",
hostkey_file);
- privkey = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
+ privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file);
GNUNET_free (hostkey_file);
GNUNET_assert (privkey != NULL);
/* get public key */
- GNUNET_CRYPTO_rsa_key_get_public(privkey, &pubkey);
+ GNUNET_CRYPTO_ecc_key_get_public(privkey, &pubkey);
/* create record */
s_name = GNUNET_NAMESTORE_normalize_string ("DUMMY.dummy.gnunet");
@@ -226,7 +226,7 @@
s_signature = GNUNET_NAMESTORE_create_signature(privkey, et, s_name,
s_first_record, 1);
/* create random zone hash */
- GNUNET_CRYPTO_short_hash (&pubkey, sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded), &s_zone);
+ GNUNET_CRYPTO_short_hash (&pubkey, sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded), &s_zone);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Name: `%s' Zone: `%s' \n", s_name,
GNUNET_short_h2s (&s_zone));
nsh = GNUNET_NAMESTORE_connect (cfg);
Modified: gnunet/src/namestore/test_namestore_api_lookup.c
===================================================================
--- gnunet/src/namestore/test_namestore_api_lookup.c 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/namestore/test_namestore_api_lookup.c 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -43,11 +43,11 @@
static GNUNET_SCHEDULER_TaskIdentifier endbadly_task;
-static struct GNUNET_CRYPTO_RsaPrivateKey * privkey;
+static struct GNUNET_CRYPTO_EccPrivateKey * privkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey;
-static struct GNUNET_CRYPTO_RsaSignature *s_signature;
+static struct GNUNET_CRYPTO_EccSignature *s_signature;
static struct GNUNET_CRYPTO_ShortHashCode s_zone;
@@ -70,7 +70,7 @@
}
if (NULL != privkey)
{
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
}
GNUNET_SCHEDULER_shutdown ();
@@ -105,12 +105,12 @@
static void
name_lookup_proc (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *n,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
static int found = GNUNET_NO;
int c;
@@ -119,13 +119,13 @@
{
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Checking returned results\n");
if (0 != memcmp (zone_key, &pubkey,
- sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded)))
+ sizeof (struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded)))
{
GNUNET_break (0);
}
GNUNET_assert (NULL != signature);
if (0 != memcmp (signature, s_signature,
- sizeof (struct GNUNET_CRYPTO_RsaSignature)))
+ sizeof (struct GNUNET_CRYPTO_EccSignature)))
{
GNUNET_break (0);
}
@@ -222,10 +222,10 @@
&endbadly, NULL);
/* load privat key from file not included in zonekey dir */
- privkey = GNUNET_CRYPTO_rsa_key_create_from_file("test_hostkey");
+ privkey = GNUNET_CRYPTO_ecc_key_create_from_file("test_hostkey");
GNUNET_assert (NULL != privkey);
/* get public key */
- GNUNET_CRYPTO_rsa_key_get_public(privkey, &pubkey);
+ GNUNET_CRYPTO_ecc_key_get_public(privkey, &pubkey);
/* create record */
s_name = GNUNET_NAMESTORE_normalize_string ("DUMMY.dummy.gnunet");
@@ -243,7 +243,7 @@
/* create random zone hash */
GNUNET_CRYPTO_short_hash (&pubkey,
- sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded),
&s_zone);
nsh = GNUNET_NAMESTORE_connect (cfg);
GNUNET_break (NULL != nsh);
Modified: gnunet/src/namestore/test_namestore_api_lookup_specific_type.c
===================================================================
--- gnunet/src/namestore/test_namestore_api_lookup_specific_type.c
2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/namestore/test_namestore_api_lookup_specific_type.c
2013-05-29 08:18:55 UTC (rev 27326)
@@ -48,11 +48,11 @@
static GNUNET_SCHEDULER_TaskIdentifier endbadly_task;
-static struct GNUNET_CRYPTO_RsaPrivateKey * privkey;
+static struct GNUNET_CRYPTO_EccPrivateKey * privkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey;
-static struct GNUNET_CRYPTO_RsaSignature *s_signature;
+static struct GNUNET_CRYPTO_EccSignature *s_signature;
static struct GNUNET_CRYPTO_ShortHashCode s_zone;
@@ -76,7 +76,7 @@
GNUNET_NAMESTORE_disconnect (nsh);
nsh = NULL;
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
GNUNET_free_non_null (s_name);
res = 1;
@@ -100,7 +100,7 @@
GNUNET_free (s_rd);
GNUNET_free_non_null (s_name);
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
if (nsh != NULL)
GNUNET_NAMESTORE_disconnect (nsh);
@@ -110,18 +110,18 @@
static void
name_lookup_existing_record_type (void *cls,
- const struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
struct GNUNET_TIME_Absolute expire,
const char *n,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature
*signature)
+ const struct GNUNET_CRYPTO_EccSignature
*signature)
{
int failed = GNUNET_NO;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Namestore returned %u records\n",
rd_count);
- if ((NULL == n) || (0 != memcmp(zone_key, &pubkey, sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded))))
+ if ((NULL == n) || (0 != memcmp(zone_key, &pubkey, sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded))))
{
GNUNET_break(0);
failed = GNUNET_YES;
@@ -156,12 +156,12 @@
static void
name_lookup_non_existing_record_type (void *cls,
- const struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
struct GNUNET_TIME_Absolute expire,
const char *n,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData
*rd,
- const struct GNUNET_CRYPTO_RsaSignature
*signature)
+ const struct GNUNET_CRYPTO_EccSignature
*signature)
{
int failed = GNUNET_NO;
/* We expect zone key != NULL, name != NULL, rd_count 0, rd NULL, signature
NULL */
@@ -280,11 +280,11 @@
GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR,
"N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n",
hostkey_file);
- privkey = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
+ privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file);
GNUNET_free (hostkey_file);
GNUNET_assert (privkey != NULL);
/* get public key */
- GNUNET_CRYPTO_rsa_key_get_public(privkey, &pubkey);
+ GNUNET_CRYPTO_ecc_key_get_public(privkey, &pubkey);
/* create record */
s_name = GNUNET_NAMESTORE_normalize_string ("DUMMY.dummy.gnunet");
@@ -300,7 +300,7 @@
s_signature = GNUNET_NAMESTORE_create_signature(privkey, et, s_name, s_rd,
RECORDS);
/* create random zone hash */
- GNUNET_CRYPTO_short_hash (&pubkey, sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded), &s_zone);
+ GNUNET_CRYPTO_short_hash (&pubkey, sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded), &s_zone);
nsh = GNUNET_NAMESTORE_connect (cfg);
GNUNET_break (NULL != nsh);
GNUNET_break (s_rd != NULL);
Modified: gnunet/src/namestore/test_namestore_api_put.c
===================================================================
--- gnunet/src/namestore/test_namestore_api_put.c 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/namestore/test_namestore_api_put.c 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -42,9 +42,9 @@
static GNUNET_SCHEDULER_TaskIdentifier endbadly_task;
-static struct GNUNET_CRYPTO_RsaPrivateKey * privkey;
+static struct GNUNET_CRYPTO_EccPrivateKey * privkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey;
static struct GNUNET_NAMESTORE_RecordData *s_rd;
@@ -66,7 +66,7 @@
if (privkey != NULL)
{
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
}
GNUNET_SCHEDULER_shutdown ();
@@ -85,7 +85,7 @@
if (privkey != NULL)
{
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
}
if (nsh != NULL)
@@ -136,7 +136,7 @@
const struct GNUNET_CONFIGURATION_Handle *cfg,
struct GNUNET_TESTING_Peer *peer)
{
- struct GNUNET_CRYPTO_RsaSignature *signature;
+ struct GNUNET_CRYPTO_EccSignature *signature;
char * s_name;
int c;
char *hostkey_file;
@@ -147,11 +147,11 @@
GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR,
"N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n",
hostkey_file);
- privkey = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
+ privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file);
GNUNET_assert (privkey != NULL);
GNUNET_free (hostkey_file);
/* get public key */
- GNUNET_CRYPTO_rsa_key_get_public(privkey, &pubkey);
+ GNUNET_CRYPTO_ecc_key_get_public(privkey, &pubkey);
nsh = GNUNET_NAMESTORE_connect (cfg);
GNUNET_break (NULL != nsh);
/* create record */
Modified: gnunet/src/namestore/test_namestore_api_remove.c
===================================================================
--- gnunet/src/namestore/test_namestore_api_remove.c 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/namestore/test_namestore_api_remove.c 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -49,11 +49,11 @@
static GNUNET_SCHEDULER_TaskIdentifier endbadly_task;
-static struct GNUNET_CRYPTO_RsaPrivateKey * privkey;
+static struct GNUNET_CRYPTO_EccPrivateKey * privkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey;
-static struct GNUNET_CRYPTO_RsaSignature *s_signature;
+static struct GNUNET_CRYPTO_EccSignature *s_signature;
static struct GNUNET_CRYPTO_ShortHashCode s_zone;
@@ -77,7 +77,7 @@
GNUNET_NAMESTORE_disconnect (nsh);
nsh = NULL;
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
GNUNET_free_non_null (s_name);
res = 1;
@@ -98,7 +98,7 @@
GNUNET_free_non_null((void *) s_rd[c].data);
GNUNET_free (s_rd);
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
if (nsh != NULL)
GNUNET_NAMESTORE_disconnect (nsh);
@@ -109,12 +109,12 @@
static void
name_lookup_proc (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *n,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
static int found = GNUNET_NO;
int failed = GNUNET_NO;
@@ -123,7 +123,7 @@
if (n != NULL)
{
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Lookup for name `%s' returned %u
records\n", n, rd_count);
- if (0 != memcmp (zone_key, &pubkey, sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded)))
+ if (0 != memcmp (zone_key, &pubkey, sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded)))
{
GNUNET_break (0);
failed = GNUNET_YES;
@@ -254,11 +254,11 @@
GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR,
"N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n",
hostkey_file);
- privkey = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
+ privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file);
GNUNET_free (hostkey_file);
GNUNET_assert (privkey != NULL);
/* get public key */
- GNUNET_CRYPTO_rsa_key_get_public(privkey, &pubkey);
+ GNUNET_CRYPTO_ecc_key_get_public(privkey, &pubkey);
/* create record */
s_name = GNUNET_NAMESTORE_normalize_string ("DUMMY.dummy.gnunet");
@@ -273,7 +273,7 @@
s_signature = GNUNET_NAMESTORE_create_signature(privkey, et, s_name, s_rd,
RECORDS);
/* create random zone hash */
- GNUNET_CRYPTO_short_hash (&pubkey, sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded), &s_zone);
+ GNUNET_CRYPTO_short_hash (&pubkey, sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded), &s_zone);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Name: `%s' Zone: `%s' \n", s_name,
GNUNET_short_h2s (&s_zone));
nsh = GNUNET_NAMESTORE_connect (cfg);
Modified: gnunet/src/namestore/test_namestore_api_remove_not_existing_record.c
===================================================================
--- gnunet/src/namestore/test_namestore_api_remove_not_existing_record.c
2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/namestore/test_namestore_api_remove_not_existing_record.c
2013-05-29 08:18:55 UTC (rev 27326)
@@ -49,11 +49,11 @@
static GNUNET_SCHEDULER_TaskIdentifier endbadly_task;
-static struct GNUNET_CRYPTO_RsaPrivateKey * privkey;
+static struct GNUNET_CRYPTO_EccPrivateKey * privkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey;
-static struct GNUNET_CRYPTO_RsaSignature *s_signature;
+static struct GNUNET_CRYPTO_EccSignature *s_signature;
static struct GNUNET_HashCode s_zone;
@@ -77,7 +77,7 @@
GNUNET_NAMESTORE_disconnect (nsh);
nsh = NULL;
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
GNUNET_free_non_null (s_name);
res = 1;
@@ -99,7 +99,7 @@
GNUNET_free (s_rd);
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
if (nsh != NULL)
GNUNET_NAMESTORE_disconnect (nsh);
@@ -190,11 +190,11 @@
GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR,
"N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n",
hostkey_file);
- privkey = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
+ privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file);
GNUNET_free (hostkey_file);
GNUNET_assert (privkey != NULL);
/* get public key */
- GNUNET_CRYPTO_rsa_key_get_public(privkey, &pubkey);
+ GNUNET_CRYPTO_ecc_key_get_public(privkey, &pubkey);
/* create record */
s_name = GNUNET_NAMESTORE_normalize_string ("DUMMY.dummy.gnunet");
@@ -209,7 +209,7 @@
s_signature = GNUNET_NAMESTORE_create_signature(privkey, et, s_name, s_rd,
RECORDS);
/* create random zone hash */
- GNUNET_CRYPTO_hash (&pubkey, sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded), &s_zone);
+ GNUNET_CRYPTO_hash (&pubkey, sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded), &s_zone);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Name: `%s' Zone: `%s' \n", s_name,
GNUNET_h2s_full(&s_zone));
nsh = GNUNET_NAMESTORE_connect (cfg);
Modified: gnunet/src/namestore/test_namestore_api_sign_verify.c
===================================================================
--- gnunet/src/namestore/test_namestore_api_sign_verify.c 2013-05-29
08:18:40 UTC (rev 27325)
+++ gnunet/src/namestore/test_namestore_api_sign_verify.c 2013-05-29
08:18:55 UTC (rev 27326)
@@ -42,9 +42,9 @@
#define TEST_REMOVE_RECORD_DATA 'b'
-static struct GNUNET_CRYPTO_RsaPrivateKey * privkey;
+static struct GNUNET_CRYPTO_EccPrivateKey * privkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey;
static struct GNUNET_NAMESTORE_RecordData *s_rd;
@@ -76,19 +76,19 @@
run (void *cls, char *const *args, const char *cfgfile,
const struct GNUNET_CONFIGURATION_Handle *cfg)
{
- struct GNUNET_CRYPTO_RsaSignature * signature;
+ struct GNUNET_CRYPTO_EccSignature * signature;
/* load privat key */
char *hostkey_file;
GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR,
"N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n",
hostkey_file);
- privkey = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
+ privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file);
GNUNET_free (hostkey_file);
GNUNET_assert (privkey != NULL);
struct GNUNET_TIME_Absolute expire = GNUNET_TIME_absolute_get();
/* get public key */
- GNUNET_CRYPTO_rsa_key_get_public(privkey, &pubkey);
+ GNUNET_CRYPTO_ecc_key_get_public(privkey, &pubkey);
int res_c;
int res_w;
Modified: gnunet/src/namestore/test_namestore_api_zone_iteration.c
===================================================================
--- gnunet/src/namestore/test_namestore_api_zone_iteration.c 2013-05-29
08:18:40 UTC (rev 27325)
+++ gnunet/src/namestore/test_namestore_api_zone_iteration.c 2013-05-29
08:18:55 UTC (rev 27326)
@@ -37,15 +37,15 @@
static GNUNET_SCHEDULER_TaskIdentifier stopiteration_task;
-static struct GNUNET_CRYPTO_RsaPrivateKey * privkey;
+static struct GNUNET_CRYPTO_EccPrivateKey * privkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey;
static struct GNUNET_HashCode zone;
-static struct GNUNET_CRYPTO_RsaPrivateKey * privkey2;
+static struct GNUNET_CRYPTO_EccPrivateKey * privkey2;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey2;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey2;
static struct GNUNET_HashCode zone2;
@@ -55,19 +55,19 @@
static int returned_records;
-static struct GNUNET_CRYPTO_RsaSignature *sig_1;
+static struct GNUNET_CRYPTO_EccSignature *sig_1;
static char * s_name_1;
static struct GNUNET_NAMESTORE_RecordData *s_rd_1;
-static struct GNUNET_CRYPTO_RsaSignature *sig_2;
+static struct GNUNET_CRYPTO_EccSignature *sig_2;
static char * s_name_2;
static struct GNUNET_NAMESTORE_RecordData *s_rd_2;
-static struct GNUNET_CRYPTO_RsaSignature *sig_3;
+static struct GNUNET_CRYPTO_EccSignature *sig_3;
static char * s_name_3;
@@ -117,11 +117,11 @@
}
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
if (privkey2 != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey2);
+ GNUNET_CRYPTO_ecc_key_free (privkey2);
privkey2 = NULL;
res = 1;
}
@@ -143,11 +143,11 @@
}
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
if (privkey2 != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey2);
+ GNUNET_CRYPTO_ecc_key_free (privkey2);
privkey2 = NULL;
GNUNET_free (sig_1);
@@ -179,12 +179,12 @@
static void
zone_proc (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
int failed = GNUNET_NO;
if ((zone_key == NULL) && (name == NULL))
@@ -204,7 +204,7 @@
if (GNUNET_OK != GNUNET_NAMESTORE_verify_signature (zone_key, expire,
name, rd_count, rd, signature))
{
struct GNUNET_HashCode zone_key_hash;
- GNUNET_CRYPTO_hash (zone_key, sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded), &zone_key_hash);
+ GNUNET_CRYPTO_hash (zone_key, sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded), &zone_key_hash);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Verifying signature for `%s' in
zone `%s' with %u records and expiration %llu failed\n", name,
GNUNET_h2s(&zone_key_hash), rd_count, expire.abs_value);
failed = GNUNET_YES;
@@ -227,7 +227,7 @@
failed = GNUNET_YES;
GNUNET_break (0);
}
- if (0 != memcmp (signature, sig_1, sizeof (struct
GNUNET_CRYPTO_RsaSignature)))
+ if (0 != memcmp (signature, sig_1, sizeof (struct
GNUNET_CRYPTO_EccSignature)))
{
failed = GNUNET_YES;
GNUNET_break (0);
@@ -248,7 +248,7 @@
failed = GNUNET_YES;
GNUNET_break (0);
}
- if (0 != memcmp (signature, sig_2, sizeof (struct
GNUNET_CRYPTO_RsaSignature)))
+ if (0 != memcmp (signature, sig_2, sizeof (struct
GNUNET_CRYPTO_EccSignature)))
{
failed = GNUNET_YES;
GNUNET_break (0);
@@ -275,7 +275,7 @@
GNUNET_break (0);
}
- if (0 != memcmp (signature, sig_3, sizeof (struct
GNUNET_CRYPTO_RsaSignature)))
+ if (0 != memcmp (signature, sig_3, sizeof (struct
GNUNET_CRYPTO_EccSignature)))
{
failed = GNUNET_YES;
GNUNET_break (0);
@@ -370,12 +370,12 @@
*/
static void
empty_zone_proc (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
char *hostkey_file;
struct GNUNET_TIME_Absolute et;
@@ -387,21 +387,21 @@
GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR,
"N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n",
hostkey_file);
- privkey = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
+ privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file);
GNUNET_free (hostkey_file);
GNUNET_assert (privkey != NULL);
- GNUNET_CRYPTO_rsa_key_get_public(privkey, &pubkey);
+ GNUNET_CRYPTO_ecc_key_get_public(privkey, &pubkey);
GNUNET_CRYPTO_hash(&pubkey, sizeof (pubkey), &zone);
GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR,
"HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n",
hostkey_file);
- privkey2 = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
+ privkey2 = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file);
GNUNET_free (hostkey_file);
GNUNET_assert (privkey2 != NULL);
- GNUNET_CRYPTO_rsa_key_get_public(privkey2, &pubkey2);
+ GNUNET_CRYPTO_ecc_key_get_public(privkey2, &pubkey2);
GNUNET_CRYPTO_hash(&pubkey2, sizeof (pubkey), &zone2);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Created record 1\n");
Modified: gnunet/src/namestore/test_namestore_api_zone_iteration_specific_zone.c
===================================================================
--- gnunet/src/namestore/test_namestore_api_zone_iteration_specific_zone.c
2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/namestore/test_namestore_api_zone_iteration_specific_zone.c
2013-05-29 08:18:55 UTC (rev 27326)
@@ -37,15 +37,15 @@
static GNUNET_SCHEDULER_TaskIdentifier stopiteration_task;
-static struct GNUNET_CRYPTO_RsaPrivateKey * privkey;
+static struct GNUNET_CRYPTO_EccPrivateKey * privkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey;
static struct GNUNET_CRYPTO_ShortHashCode zone;
-static struct GNUNET_CRYPTO_RsaPrivateKey * privkey2;
+static struct GNUNET_CRYPTO_EccPrivateKey * privkey2;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey2;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey2;
static struct GNUNET_CRYPTO_ShortHashCode zone2;
@@ -55,19 +55,19 @@
static int returned_records;
-static struct GNUNET_CRYPTO_RsaSignature *sig_1;
+static struct GNUNET_CRYPTO_EccSignature *sig_1;
static char * s_name_1;
static struct GNUNET_NAMESTORE_RecordData *s_rd_1;
-static struct GNUNET_CRYPTO_RsaSignature *sig_2;
+static struct GNUNET_CRYPTO_EccSignature *sig_2;
static char * s_name_2;
static struct GNUNET_NAMESTORE_RecordData *s_rd_2;
-static struct GNUNET_CRYPTO_RsaSignature *sig_3;
+static struct GNUNET_CRYPTO_EccSignature *sig_3;
static char * s_name_3;
@@ -115,11 +115,11 @@
}
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
if (privkey2 != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey2);
+ GNUNET_CRYPTO_ecc_key_free (privkey2);
privkey2 = NULL;
res = 1;
}
@@ -139,10 +139,10 @@
endbadly_task = GNUNET_SCHEDULER_NO_TASK;
}
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
if (privkey2 != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey2);
+ GNUNET_CRYPTO_ecc_key_free (privkey2);
privkey2 = NULL;
GNUNET_free (sig_1);
@@ -174,12 +174,12 @@
static void
zone_proc (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
int failed = GNUNET_NO;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Callback for zone `%s'\n",
GNUNET_short_h2s (&zone));
@@ -212,7 +212,7 @@
failed = GNUNET_YES;
GNUNET_break (0);
}
- if (0 != memcmp (signature, sig_1, sizeof (struct
GNUNET_CRYPTO_RsaSignature)))
+ if (0 != memcmp (signature, sig_1, sizeof (struct
GNUNET_CRYPTO_EccSignature)))
{
failed = GNUNET_YES;
GNUNET_break (0);
@@ -233,7 +233,7 @@
failed = GNUNET_YES;
GNUNET_break (0);
}
- if (0 != memcmp (signature, sig_2, sizeof (struct
GNUNET_CRYPTO_RsaSignature)))
+ if (0 != memcmp (signature, sig_2, sizeof (struct
GNUNET_CRYPTO_EccSignature)))
{
failed = GNUNET_YES;
GNUNET_break (0);
@@ -334,19 +334,19 @@
GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR,
"N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n",
hostkey_file);
- privkey = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
+ privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file);
GNUNET_free (hostkey_file);
GNUNET_assert (privkey != NULL);
- GNUNET_CRYPTO_rsa_key_get_public(privkey, &pubkey);
+ GNUNET_CRYPTO_ecc_key_get_public(privkey, &pubkey);
GNUNET_CRYPTO_short_hash (&pubkey, sizeof (pubkey), &zone);
GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR,
"HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n",
hostkey_file);
- privkey2 = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
+ privkey2 = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file);
GNUNET_free (hostkey_file);
GNUNET_assert (privkey2 != NULL);
- GNUNET_CRYPTO_rsa_key_get_public(privkey2, &pubkey2);
+ GNUNET_CRYPTO_ecc_key_get_public(privkey2, &pubkey2);
GNUNET_CRYPTO_short_hash (&pubkey2, sizeof (pubkey), &zone2);
nsh = GNUNET_NAMESTORE_connect (cfg);
GNUNET_break (NULL != nsh);
Modified: gnunet/src/namestore/test_namestore_api_zone_iteration_stop.c
===================================================================
--- gnunet/src/namestore/test_namestore_api_zone_iteration_stop.c
2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/namestore/test_namestore_api_zone_iteration_stop.c
2013-05-29 08:18:55 UTC (rev 27326)
@@ -36,15 +36,15 @@
static GNUNET_SCHEDULER_TaskIdentifier stopiteration_task;
-static struct GNUNET_CRYPTO_RsaPrivateKey * privkey;
+static struct GNUNET_CRYPTO_EccPrivateKey * privkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey;
static struct GNUNET_HashCode zone;
-static struct GNUNET_CRYPTO_RsaPrivateKey * privkey2;
+static struct GNUNET_CRYPTO_EccPrivateKey * privkey2;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey2;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey2;
static struct GNUNET_HashCode zone2;
@@ -54,19 +54,19 @@
static int returned_records;
-static struct GNUNET_CRYPTO_RsaSignature *sig_1;
+static struct GNUNET_CRYPTO_EccSignature *sig_1;
static char * s_name_1;
static struct GNUNET_NAMESTORE_RecordData *s_rd_1;
-static struct GNUNET_CRYPTO_RsaSignature *sig_2;
+static struct GNUNET_CRYPTO_EccSignature *sig_2;
static char * s_name_2;
static struct GNUNET_NAMESTORE_RecordData *s_rd_2;
-static struct GNUNET_CRYPTO_RsaSignature *sig_3;
+static struct GNUNET_CRYPTO_EccSignature *sig_3;
static char * s_name_3;
@@ -112,11 +112,11 @@
GNUNET_free (s_rd_3);
}
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
if (privkey2 != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey2);
+ GNUNET_CRYPTO_ecc_key_free (privkey2);
privkey2 = NULL;
res = 1;
}
@@ -137,10 +137,10 @@
endbadly_task = GNUNET_SCHEDULER_NO_TASK;
}
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
if (privkey2 != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey2);
+ GNUNET_CRYPTO_ecc_key_free (privkey2);
privkey2 = NULL;
GNUNET_free (sig_1);
@@ -177,12 +177,12 @@
static void
zone_proc (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
int failed = GNUNET_NO;
@@ -383,19 +383,19 @@
GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR,
"N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n",
hostkey_file);
- privkey = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
+ privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file);
GNUNET_free (hostkey_file);
GNUNET_assert (privkey != NULL);
- GNUNET_CRYPTO_rsa_key_get_public(privkey, &pubkey);
+ GNUNET_CRYPTO_ecc_key_get_public(privkey, &pubkey);
GNUNET_CRYPTO_hash(&pubkey, sizeof (pubkey), &zone);
GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR,
"HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n",
hostkey_file);
- privkey2 = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
+ privkey2 = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file);
GNUNET_free (hostkey_file);
GNUNET_assert (privkey2 != NULL);
- GNUNET_CRYPTO_rsa_key_get_public(privkey2, &pubkey2);
+ GNUNET_CRYPTO_ecc_key_get_public(privkey2, &pubkey2);
GNUNET_CRYPTO_hash(&pubkey2, sizeof (pubkey), &zone2);
nsh = GNUNET_NAMESTORE_connect (cfg);
Modified: gnunet/src/namestore/test_namestore_api_zone_to_name.c
===================================================================
--- gnunet/src/namestore/test_namestore_api_zone_to_name.c 2013-05-29
08:18:40 UTC (rev 27325)
+++ gnunet/src/namestore/test_namestore_api_zone_to_name.c 2013-05-29
08:18:55 UTC (rev 27326)
@@ -43,9 +43,9 @@
static GNUNET_SCHEDULER_TaskIdentifier endbadly_task;
-static struct GNUNET_CRYPTO_RsaPrivateKey * privkey;
+static struct GNUNET_CRYPTO_EccPrivateKey * privkey;
-static struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pubkey;
+static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey;
static struct GNUNET_TIME_Absolute expire;
@@ -55,7 +55,7 @@
static char * s_name;
-static struct GNUNET_CRYPTO_RsaSignature *s_signature;
+static struct GNUNET_CRYPTO_EccSignature *s_signature;
static int res;
@@ -73,7 +73,7 @@
GNUNET_NAMESTORE_disconnect (nsh);
nsh = NULL;
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
res = 1;
}
@@ -88,7 +88,7 @@
endbadly_task = GNUNET_SCHEDULER_NO_TASK;
}
if (privkey != NULL)
- GNUNET_CRYPTO_rsa_key_free (privkey);
+ GNUNET_CRYPTO_ecc_key_free (privkey);
privkey = NULL;
if (nsh != NULL)
GNUNET_NAMESTORE_disconnect (nsh);
@@ -98,12 +98,12 @@
static void
zone_to_name_proc (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded
*zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded
*zone_key,
struct GNUNET_TIME_Absolute expire,
const char *n,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
int fail = GNUNET_NO;
@@ -125,7 +125,7 @@
fail = GNUNET_YES;
GNUNET_break (0);
}
- if ((zone_key == NULL) || (0 != memcmp (zone_key, &pubkey, sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded))))
+ if ((zone_key == NULL) || (0 != memcmp (zone_key, &pubkey, sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded))))
{
fail = GNUNET_YES;
GNUNET_break (0);
@@ -175,14 +175,14 @@
GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR,
"N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n",
hostkey_file);
- privkey = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
+ privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file);
GNUNET_free (hostkey_file);
GNUNET_assert (privkey != NULL);
/* get public key */
- GNUNET_CRYPTO_rsa_key_get_public(privkey, &pubkey);
+ GNUNET_CRYPTO_ecc_key_get_public(privkey, &pubkey);
/* zone hash */
- GNUNET_CRYPTO_short_hash (&pubkey, sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded), &s_zone);
+ GNUNET_CRYPTO_short_hash (&pubkey, sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded), &s_zone);
GNUNET_CRYPTO_short_hash (s_name, strlen (s_name) + 1, &s_zone_value);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using PKEY `%s' \n", GNUNET_short_h2s
(&s_zone_value));
Modified: gnunet/src/namestore/test_plugin_namestore.c
===================================================================
--- gnunet/src/namestore/test_plugin_namestore.c 2013-05-29 08:18:40 UTC
(rev 27325)
+++ gnunet/src/namestore/test_plugin_namestore.c 2013-05-29 08:18:55 UTC
(rev 27326)
@@ -95,19 +95,19 @@
*/
static void
test_record (void *cls,
- const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
+ const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key,
struct GNUNET_TIME_Absolute expire,
const char *name,
unsigned int rd_count,
const struct GNUNET_NAMESTORE_RecordData *rd,
- const struct GNUNET_CRYPTO_RsaSignature *signature)
+ const struct GNUNET_CRYPTO_EccSignature *signature)
{
int *idp = cls;
int id = *idp;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded tzone_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded tzone_key;
char tname[64];
unsigned int trd_count = 1 + (id % 1024);
- struct GNUNET_CRYPTO_RsaSignature tsignature;
+ struct GNUNET_CRYPTO_EccSignature tsignature;
unsigned int i;
GNUNET_snprintf (tname, sizeof (tname),
@@ -122,8 +122,8 @@
memset (&tzone_key, (id % 241), sizeof (tzone_key));
memset (&tsignature, (id % 243), sizeof (tsignature));
GNUNET_assert (0 == strcmp (name, tname));
- GNUNET_assert (0 == memcmp (&tzone_key, zone_key, sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded)));
- GNUNET_assert (0 == memcmp (&tsignature, signature, sizeof (struct
GNUNET_CRYPTO_RsaSignature)));
+ GNUNET_assert (0 == memcmp (&tzone_key, zone_key, sizeof (struct
GNUNET_CRYPTO_EccPublicKeyBinaryEncoded)));
+ GNUNET_assert (0 == memcmp (&tsignature, signature, sizeof (struct
GNUNET_CRYPTO_EccSignature)));
}
@@ -139,12 +139,12 @@
static void
put_record (struct GNUNET_NAMESTORE_PluginFunctions *nsp, int id)
{
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded zone_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded zone_key;
struct GNUNET_TIME_Absolute expire;
char name[64];
unsigned int rd_count = 1 + (id % 1024);
struct GNUNET_NAMESTORE_RecordData rd[rd_count];
- struct GNUNET_CRYPTO_RsaSignature signature;
+ struct GNUNET_CRYPTO_EccSignature signature;
unsigned int i;
GNUNET_snprintf (name, sizeof (name),
@@ -175,7 +175,7 @@
const struct GNUNET_CONFIGURATION_Handle *cfg)
{
struct GNUNET_NAMESTORE_PluginFunctions *nsp;
- struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded zone_key;
+ struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded zone_key;
struct GNUNET_CRYPTO_ShortHashCode zone;
ok = 0;
Modified:
gnunet/src/namestore/zonefiles/HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey
===================================================================
(Binary files differ)
Modified:
gnunet/src/namestore/zonefiles/N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey
===================================================================
(Binary files differ)
Modified: gnunet/src/pt/test_gns_vpn.c
===================================================================
--- gnunet/src/pt/test_gns_vpn.c 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/pt/test_gns_vpn.c 2013-05-29 08:18:55 UTC (rev 27326)
@@ -363,7 +363,7 @@
enum MHD_FLAG flags;
struct GNUNET_PeerIdentity id;
struct GNUNET_CRYPTO_HashAsciiEncoded peername;
- struct GNUNET_CRYPTO_RsaPrivateKey *host_key;
+ struct GNUNET_CRYPTO_EccPrivateKey *host_key;
struct GNUNET_NAMESTORE_RecordData rd;
char *rd_string;
char *zone_keyfile;
@@ -392,7 +392,7 @@
return;
}
- host_key = GNUNET_CRYPTO_rsa_key_create_from_file (zone_keyfile);
+ host_key = GNUNET_CRYPTO_ecc_key_create_from_file (zone_keyfile);
rd.expiration_time = GNUNET_TIME_UNIT_FOREVER_ABS.abs_value;
GNUNET_asprintf (&rd_string, "6 %s %s", (char*)&peername, "www.gads.");
GNUNET_assert (GNUNET_OK == GNUNET_NAMESTORE_string_to_value
(GNUNET_GNS_RECORD_VPN,
@@ -410,7 +410,7 @@
GNUNET_free ((void**)rd.data);
GNUNET_free (rd_string);
GNUNET_free (zone_keyfile);
- GNUNET_CRYPTO_rsa_key_free (host_key);
+ GNUNET_CRYPTO_ecc_key_free (host_key);
}
@@ -561,7 +561,7 @@
GNUNET_free (bin_vpn);
GNUNET_free (bin_exit);
GNUNET_free (bin_dns);
- GNUNET_CRYPTO_rsa_setup_hostkey ("test_gns_vpn.conf");
+ GNUNET_CRYPTO_ecc_setup_hostkey ("test_gns_vpn.conf");
dest_ip = "169.254.86.1";
dest_af = AF_INET;
Modified: gnunet/src/pt/test_gnunet_vpn.c
===================================================================
--- gnunet/src/pt/test_gnunet_vpn.c 2013-05-29 08:18:40 UTC (rev 27325)
+++ gnunet/src/pt/test_gnunet_vpn.c 2013-05-29 08:18:55 UTC (rev 27326)
@@ -426,7 +426,7 @@
GNUNET_free (vpn_binary);
GNUNET_free (exit_binary);
- GNUNET_CRYPTO_rsa_setup_hostkey ("test_gnunet_vpn.conf");
+ GNUNET_CRYPTO_ecc_setup_hostkey ("test_gnunet_vpn.conf");
bin = argv[0];
if (NULL != strstr (bin, "lt-"))
bin = strstr (bin, "lt-") + 4;
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [GNUnet-SVN] r27326 - in gnunet/src: . dns gns gns/zonefiles include namestore namestore/zonefiles pt,
gnunet <=