aboutsummaryrefslogtreecommitdiff
path: root/src/namestore/test_namestore_api_zone_iteration.c
diff options
context:
space:
mode:
authorMatthias Wachs <wachs@net.in.tum.de>2012-03-08 17:26:46 +0000
committerMatthias Wachs <wachs@net.in.tum.de>2012-03-08 17:26:46 +0000
commit59c5988e74fdaeb193d3daa2dee12b620c7eee75 (patch)
tree33dbb4f1e357fec076d278fdcf6d7b7f9ae182c8 /src/namestore/test_namestore_api_zone_iteration.c
parent5b0d869b093391f8979475f00e21cc28e43f107c (diff)
downloadgnunet-59c5988e74fdaeb193d3daa2dee12b620c7eee75.tar.gz
gnunet-59c5988e74fdaeb193d3daa2dee12b620c7eee75.zip
namestore manages zonekey files with private keys
Diffstat (limited to 'src/namestore/test_namestore_api_zone_iteration.c')
-rw-r--r--src/namestore/test_namestore_api_zone_iteration.c13
1 files changed, 11 insertions, 2 deletions
diff --git a/src/namestore/test_namestore_api_zone_iteration.c b/src/namestore/test_namestore_api_zone_iteration.c
index 92e8e7988..f06411061 100644
--- a/src/namestore/test_namestore_api_zone_iteration.c
+++ b/src/namestore/test_namestore_api_zone_iteration.c
@@ -387,12 +387,21 @@ run (void *cls, char *const *args, const char *cfgfile,
387 delete_existing_db(cfg); 387 delete_existing_db(cfg);
388 endbadly_task = GNUNET_SCHEDULER_add_delayed(TIMEOUT,&endbadly, NULL); 388 endbadly_task = GNUNET_SCHEDULER_add_delayed(TIMEOUT,&endbadly, NULL);
389 389
390 privkey = GNUNET_CRYPTO_rsa_key_create_from_file("hostkey"); 390 char *hostkey_file;
391 GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, "4UCICULTINKC87UO4326KEEDQ9MTEP2AJT88MJFVGTGNK12QNGMQI2S41VI07UUU6EO19BTB06PDL0HE6VP1OM50HOJEI75RHP4JP80.zone");
392 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file);
393 privkey = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
394 GNUNET_free (hostkey_file);
391 GNUNET_assert (privkey != NULL); 395 GNUNET_assert (privkey != NULL);
392 GNUNET_CRYPTO_rsa_key_get_public(privkey, &pubkey); 396 GNUNET_CRYPTO_rsa_key_get_public(privkey, &pubkey);
393 GNUNET_CRYPTO_hash(&pubkey, sizeof (pubkey), &zone); 397 GNUNET_CRYPTO_hash(&pubkey, sizeof (pubkey), &zone);
394 398
395 privkey2 = GNUNET_CRYPTO_rsa_key_create_from_file("hostkey2"); 399
400 GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, "KJI3AL00K91EDPFJF58DAJM7H61D189TLP70N56JL8SVDCJE1SJ3SNNBOQPPONTL37FMHPS39SMK2NMVC0GQMGA6QCMHITT78O8GF80.zone");
401 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file);
402 privkey2 = GNUNET_CRYPTO_rsa_key_create_from_file(hostkey_file);
403 GNUNET_free (hostkey_file);
404
396 GNUNET_assert (privkey2 != NULL); 405 GNUNET_assert (privkey2 != NULL);
397 GNUNET_CRYPTO_rsa_key_get_public(privkey2, &pubkey2); 406 GNUNET_CRYPTO_rsa_key_get_public(privkey2, &pubkey2);
398 GNUNET_CRYPTO_hash(&pubkey2, sizeof (pubkey), &zone2); 407 GNUNET_CRYPTO_hash(&pubkey2, sizeof (pubkey), &zone2);