diff options
author | Christian Grothoff <christian@grothoff.org> | 2013-09-30 11:32:30 +0000 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2013-09-30 11:32:30 +0000 |
commit | 45b5c1f11144bc14fae34c991ae9db89d6ba8913 (patch) | |
tree | f4a2fbe70573e0d9bb56d4ccb8be29fcf0c50c55 /src/util | |
parent | 05ef63d9f8cf65561b7ed2234efdc80e3fb40bd0 (diff) | |
download | gnunet-45b5c1f11144bc14fae34c991ae9db89d6ba8913.tar.gz gnunet-45b5c1f11144bc14fae34c991ae9db89d6ba8913.zip |
-rename files/symbols from _aes to _symmetric
Diffstat (limited to 'src/util')
-rw-r--r-- | src/util/Makefile.am | 18 | ||||
-rw-r--r-- | src/util/crypto_hash.c | 14 | ||||
-rw-r--r-- | src/util/crypto_symmetric.c (renamed from src/util/crypto_aes.c) | 34 | ||||
-rw-r--r-- | src/util/perf_crypto_symmetric.c (renamed from src/util/perf_crypto_aes.c) | 12 | ||||
-rw-r--r-- | src/util/test_crypto_hash.c | 4 | ||||
-rw-r--r-- | src/util/test_crypto_symmetric.c (renamed from src/util/test_crypto_aes.c) | 26 |
6 files changed, 54 insertions, 54 deletions
diff --git a/src/util/Makefile.am b/src/util/Makefile.am index 6c1d8d785..934385663 100644 --- a/src/util/Makefile.am +++ b/src/util/Makefile.am | |||
@@ -75,7 +75,7 @@ libgnunetutil_la_SOURCES = \ | |||
75 | container_multihashmap.c \ | 75 | container_multihashmap.c \ |
76 | container_multihashmap32.c \ | 76 | container_multihashmap32.c \ |
77 | container_slist.c \ | 77 | container_slist.c \ |
78 | crypto_aes.c \ | 78 | crypto_symmetric.c \ |
79 | crypto_crc.c \ | 79 | crypto_crc.c \ |
80 | crypto_ecc.c \ | 80 | crypto_ecc.c \ |
81 | crypto_hash.c \ | 81 | crypto_hash.c \ |
@@ -189,7 +189,7 @@ libgnunet_plugin_test_la_LDFLAGS = \ | |||
189 | if HAVE_BENCHMARKS | 189 | if HAVE_BENCHMARKS |
190 | BENCHMARKS = \ | 190 | BENCHMARKS = \ |
191 | perf_crypto_hash \ | 191 | perf_crypto_hash \ |
192 | perf_crypto_aes \ | 192 | perf_crypto_symmetric \ |
193 | perf_malloc | 193 | perf_malloc |
194 | endif | 194 | endif |
195 | 195 | ||
@@ -206,7 +206,7 @@ check_PROGRAMS = \ | |||
206 | test_container_multihashmap32 \ | 206 | test_container_multihashmap32 \ |
207 | test_container_heap \ | 207 | test_container_heap \ |
208 | test_container_slist \ | 208 | test_container_slist \ |
209 | test_crypto_aes \ | 209 | test_crypto_symmetric \ |
210 | test_crypto_crc \ | 210 | test_crypto_crc \ |
211 | test_crypto_ecc \ | 211 | test_crypto_ecc \ |
212 | test_crypto_hash \ | 212 | test_crypto_hash \ |
@@ -320,9 +320,9 @@ test_container_slist_SOURCES = \ | |||
320 | test_container_slist_LDADD = \ | 320 | test_container_slist_LDADD = \ |
321 | $(top_builddir)/src/util/libgnunetutil.la | 321 | $(top_builddir)/src/util/libgnunetutil.la |
322 | 322 | ||
323 | test_crypto_aes_SOURCES = \ | 323 | test_crypto_symmetric_SOURCES = \ |
324 | test_crypto_aes.c | 324 | test_crypto_symmetric.c |
325 | test_crypto_aes_LDADD = \ | 325 | test_crypto_symmetric_LDADD = \ |
326 | $(top_builddir)/src/util/libgnunetutil.la | 326 | $(top_builddir)/src/util/libgnunetutil.la |
327 | 327 | ||
328 | test_crypto_crc_SOURCES = \ | 328 | test_crypto_crc_SOURCES = \ |
@@ -494,9 +494,9 @@ perf_crypto_hash_SOURCES = \ | |||
494 | perf_crypto_hash_LDADD = \ | 494 | perf_crypto_hash_LDADD = \ |
495 | $(top_builddir)/src/util/libgnunetutil.la | 495 | $(top_builddir)/src/util/libgnunetutil.la |
496 | 496 | ||
497 | perf_crypto_aes_SOURCES = \ | 497 | perf_crypto_symmetric_SOURCES = \ |
498 | perf_crypto_aes.c | 498 | perf_crypto_symmetric.c |
499 | perf_crypto_aes_LDADD = \ | 499 | perf_crypto_symmetric_LDADD = \ |
500 | $(top_builddir)/src/util/libgnunetutil.la | 500 | $(top_builddir)/src/util/libgnunetutil.la |
501 | 501 | ||
502 | perf_malloc_SOURCES = \ | 502 | perf_malloc_SOURCES = \ |
diff --git a/src/util/crypto_hash.c b/src/util/crypto_hash.c index 47baf660f..e1997c3bb 100644 --- a/src/util/crypto_hash.c +++ b/src/util/crypto_hash.c | |||
@@ -395,16 +395,16 @@ GNUNET_CRYPTO_hash_xor (const struct GNUNET_HashCode * a, const struct GNUNET_Ha | |||
395 | */ | 395 | */ |
396 | void | 396 | void |
397 | GNUNET_CRYPTO_hash_to_aes_key (const struct GNUNET_HashCode *hc, | 397 | GNUNET_CRYPTO_hash_to_aes_key (const struct GNUNET_HashCode *hc, |
398 | struct GNUNET_CRYPTO_AesSessionKey *skey, | 398 | struct GNUNET_CRYPTO_SymmetricSessionKey *skey, |
399 | struct GNUNET_CRYPTO_AesInitializationVector *iv) | 399 | struct GNUNET_CRYPTO_SymmetricInitializationVector *iv) |
400 | { | 400 | { |
401 | GNUNET_assert (GNUNET_YES == | 401 | GNUNET_assert (GNUNET_YES == |
402 | GNUNET_CRYPTO_kdf (skey, sizeof (struct GNUNET_CRYPTO_AesSessionKey), | 402 | GNUNET_CRYPTO_kdf (skey, sizeof (struct GNUNET_CRYPTO_SymmetricSessionKey), |
403 | "Hash key derivation", strlen ("Hash key derivation"), | 403 | "Hash key derivation", strlen ("Hash key derivation"), |
404 | hc, sizeof (struct GNUNET_HashCode), | 404 | hc, sizeof (struct GNUNET_HashCode), |
405 | NULL, 0)); | 405 | NULL, 0)); |
406 | GNUNET_assert (GNUNET_YES == | 406 | GNUNET_assert (GNUNET_YES == |
407 | GNUNET_CRYPTO_kdf (iv, sizeof (struct GNUNET_CRYPTO_AesInitializationVector), | 407 | GNUNET_CRYPTO_kdf (iv, sizeof (struct GNUNET_CRYPTO_SymmetricInitializationVector), |
408 | "Initialization vector derivation", strlen ("Initialization vector derivation"), | 408 | "Initialization vector derivation", strlen ("Initialization vector derivation"), |
409 | hc, sizeof (struct GNUNET_HashCode), | 409 | hc, sizeof (struct GNUNET_HashCode), |
410 | NULL, 0)); | 410 | NULL, 0)); |
@@ -521,7 +521,7 @@ GNUNET_CRYPTO_hash_xorcmp (const struct GNUNET_HashCode *h1, | |||
521 | */ | 521 | */ |
522 | void | 522 | void |
523 | GNUNET_CRYPTO_hmac_derive_key (struct GNUNET_CRYPTO_AuthKey *key, | 523 | GNUNET_CRYPTO_hmac_derive_key (struct GNUNET_CRYPTO_AuthKey *key, |
524 | const struct GNUNET_CRYPTO_AesSessionKey *rkey, | 524 | const struct GNUNET_CRYPTO_SymmetricSessionKey *rkey, |
525 | const void *salt, size_t salt_len, ...) | 525 | const void *salt, size_t salt_len, ...) |
526 | { | 526 | { |
527 | va_list argp; | 527 | va_list argp; |
@@ -542,13 +542,13 @@ GNUNET_CRYPTO_hmac_derive_key (struct GNUNET_CRYPTO_AuthKey *key, | |||
542 | */ | 542 | */ |
543 | void | 543 | void |
544 | GNUNET_CRYPTO_hmac_derive_key_v (struct GNUNET_CRYPTO_AuthKey *key, | 544 | GNUNET_CRYPTO_hmac_derive_key_v (struct GNUNET_CRYPTO_AuthKey *key, |
545 | const struct GNUNET_CRYPTO_AesSessionKey *rkey, | 545 | const struct GNUNET_CRYPTO_SymmetricSessionKey *rkey, |
546 | const void *salt, size_t salt_len, | 546 | const void *salt, size_t salt_len, |
547 | va_list argp) | 547 | va_list argp) |
548 | { | 548 | { |
549 | GNUNET_CRYPTO_kdf_v (key->key, sizeof (key->key), | 549 | GNUNET_CRYPTO_kdf_v (key->key, sizeof (key->key), |
550 | salt, salt_len, | 550 | salt, salt_len, |
551 | rkey, sizeof (struct GNUNET_CRYPTO_AesSessionKey), | 551 | rkey, sizeof (struct GNUNET_CRYPTO_SymmetricSessionKey), |
552 | argp); | 552 | argp); |
553 | } | 553 | } |
554 | 554 | ||
diff --git a/src/util/crypto_aes.c b/src/util/crypto_symmetric.c index 91c578ab8..3e4f9d748 100644 --- a/src/util/crypto_aes.c +++ b/src/util/crypto_symmetric.c | |||
@@ -19,7 +19,7 @@ | |||
19 | */ | 19 | */ |
20 | 20 | ||
21 | /** | 21 | /** |
22 | * @file util/crypto_aes.c | 22 | * @file util/crypto_symmetric.c |
23 | * @brief Symmetric encryption services; combined cipher AES+TWOFISH (256-bit each) | 23 | * @brief Symmetric encryption services; combined cipher AES+TWOFISH (256-bit each) |
24 | * @author Christian Grothoff | 24 | * @author Christian Grothoff |
25 | * @author Ioana Patrascu | 25 | * @author Ioana Patrascu |
@@ -38,7 +38,7 @@ | |||
38 | * @param key session key to initialize | 38 | * @param key session key to initialize |
39 | */ | 39 | */ |
40 | void | 40 | void |
41 | GNUNET_CRYPTO_aes_create_session_key (struct GNUNET_CRYPTO_AesSessionKey *key) | 41 | GNUNET_CRYPTO_symmetric_create_session_key (struct GNUNET_CRYPTO_SymmetricSessionKey *key) |
42 | { | 42 | { |
43 | gcry_randomize (key->aes_key, | 43 | gcry_randomize (key->aes_key, |
44 | GNUNET_CRYPTO_AES_KEY_LENGTH, | 44 | GNUNET_CRYPTO_AES_KEY_LENGTH, |
@@ -59,8 +59,8 @@ GNUNET_CRYPTO_aes_create_session_key (struct GNUNET_CRYPTO_AesSessionKey *key) | |||
59 | */ | 59 | */ |
60 | static int | 60 | static int |
61 | setup_cipher_aes (gcry_cipher_hd_t *handle, | 61 | setup_cipher_aes (gcry_cipher_hd_t *handle, |
62 | const struct GNUNET_CRYPTO_AesSessionKey *sessionkey, | 62 | const struct GNUNET_CRYPTO_SymmetricSessionKey *sessionkey, |
63 | const struct GNUNET_CRYPTO_AesInitializationVector *iv) | 63 | const struct GNUNET_CRYPTO_SymmetricInitializationVector *iv) |
64 | { | 64 | { |
65 | int rc; | 65 | int rc; |
66 | 66 | ||
@@ -89,8 +89,8 @@ setup_cipher_aes (gcry_cipher_hd_t *handle, | |||
89 | */ | 89 | */ |
90 | static int | 90 | static int |
91 | setup_cipher_twofish (gcry_cipher_hd_t *handle, | 91 | setup_cipher_twofish (gcry_cipher_hd_t *handle, |
92 | const struct GNUNET_CRYPTO_AesSessionKey *sessionkey, | 92 | const struct GNUNET_CRYPTO_SymmetricSessionKey *sessionkey, |
93 | const struct GNUNET_CRYPTO_AesInitializationVector *iv) | 93 | const struct GNUNET_CRYPTO_SymmetricInitializationVector *iv) |
94 | { | 94 | { |
95 | int rc; | 95 | int rc; |
96 | 96 | ||
@@ -122,10 +122,10 @@ setup_cipher_twofish (gcry_cipher_hd_t *handle, | |||
122 | * @returns the size of the encrypted block, -1 for errors | 122 | * @returns the size of the encrypted block, -1 for errors |
123 | */ | 123 | */ |
124 | ssize_t | 124 | ssize_t |
125 | GNUNET_CRYPTO_aes_encrypt (const void *block, size_t len, | 125 | GNUNET_CRYPTO_symmetric_encrypt (const void *block, size_t len, |
126 | const struct GNUNET_CRYPTO_AesSessionKey * | 126 | const struct GNUNET_CRYPTO_SymmetricSessionKey * |
127 | sessionkey, | 127 | sessionkey, |
128 | const struct GNUNET_CRYPTO_AesInitializationVector * | 128 | const struct GNUNET_CRYPTO_SymmetricInitializationVector * |
129 | iv, void *result) | 129 | iv, void *result) |
130 | { | 130 | { |
131 | gcry_cipher_hd_t handle; | 131 | gcry_cipher_hd_t handle; |
@@ -156,9 +156,9 @@ GNUNET_CRYPTO_aes_encrypt (const void *block, size_t len, | |||
156 | * @return -1 on failure, size of decrypted block on success | 156 | * @return -1 on failure, size of decrypted block on success |
157 | */ | 157 | */ |
158 | ssize_t | 158 | ssize_t |
159 | GNUNET_CRYPTO_aes_decrypt (const void *block, size_t size, | 159 | GNUNET_CRYPTO_symmetric_decrypt (const void *block, size_t size, |
160 | const struct GNUNET_CRYPTO_AesSessionKey *sessionkey, | 160 | const struct GNUNET_CRYPTO_SymmetricSessionKey *sessionkey, |
161 | const struct GNUNET_CRYPTO_AesInitializationVector *iv, | 161 | const struct GNUNET_CRYPTO_SymmetricInitializationVector *iv, |
162 | void *result) | 162 | void *result) |
163 | { | 163 | { |
164 | gcry_cipher_hd_t handle; | 164 | gcry_cipher_hd_t handle; |
@@ -187,14 +187,14 @@ GNUNET_CRYPTO_aes_decrypt (const void *block, size_t size, | |||
187 | * @param ... pairs of void * & size_t for context chunks, terminated by NULL | 187 | * @param ... pairs of void * & size_t for context chunks, terminated by NULL |
188 | */ | 188 | */ |
189 | void | 189 | void |
190 | GNUNET_CRYPTO_aes_derive_iv (struct GNUNET_CRYPTO_AesInitializationVector *iv, | 190 | GNUNET_CRYPTO_symmetric_derive_iv (struct GNUNET_CRYPTO_SymmetricInitializationVector *iv, |
191 | const struct GNUNET_CRYPTO_AesSessionKey *skey, | 191 | const struct GNUNET_CRYPTO_SymmetricSessionKey *skey, |
192 | const void *salt, size_t salt_len, ...) | 192 | const void *salt, size_t salt_len, ...) |
193 | { | 193 | { |
194 | va_list argp; | 194 | va_list argp; |
195 | 195 | ||
196 | va_start (argp, salt_len); | 196 | va_start (argp, salt_len); |
197 | GNUNET_CRYPTO_aes_derive_iv_v (iv, skey, salt, salt_len, argp); | 197 | GNUNET_CRYPTO_symmetric_derive_iv_v (iv, skey, salt, salt_len, argp); |
198 | va_end (argp); | 198 | va_end (argp); |
199 | } | 199 | } |
200 | 200 | ||
@@ -209,8 +209,8 @@ GNUNET_CRYPTO_aes_derive_iv (struct GNUNET_CRYPTO_AesInitializationVector *iv, | |||
209 | * @param argp pairs of void * & size_t for context chunks, terminated by NULL | 209 | * @param argp pairs of void * & size_t for context chunks, terminated by NULL |
210 | */ | 210 | */ |
211 | void | 211 | void |
212 | GNUNET_CRYPTO_aes_derive_iv_v (struct GNUNET_CRYPTO_AesInitializationVector *iv, | 212 | GNUNET_CRYPTO_symmetric_derive_iv_v (struct GNUNET_CRYPTO_SymmetricInitializationVector *iv, |
213 | const struct GNUNET_CRYPTO_AesSessionKey *skey, | 213 | const struct GNUNET_CRYPTO_SymmetricSessionKey *skey, |
214 | const void *salt, size_t salt_len, va_list argp) | 214 | const void *salt, size_t salt_len, va_list argp) |
215 | { | 215 | { |
216 | char aes_salt[salt_len + 4]; | 216 | char aes_salt[salt_len + 4]; |
diff --git a/src/util/perf_crypto_aes.c b/src/util/perf_crypto_symmetric.c index f02335afe..9f4e2a938 100644 --- a/src/util/perf_crypto_aes.c +++ b/src/util/perf_crypto_symmetric.c | |||
@@ -20,7 +20,7 @@ | |||
20 | 20 | ||
21 | /** | 21 | /** |
22 | * @author Christian Grothoff | 22 | * @author Christian Grothoff |
23 | * @file util/perf_crypto_aes.c | 23 | * @file util/perf_crypto_symmetric.c |
24 | * @brief measure performance of encryption function | 24 | * @brief measure performance of encryption function |
25 | */ | 25 | */ |
26 | #include "platform.h" | 26 | #include "platform.h" |
@@ -35,19 +35,19 @@ perfEncrypt () | |||
35 | unsigned int i; | 35 | unsigned int i; |
36 | char buf[64 * 1024]; | 36 | char buf[64 * 1024]; |
37 | char rbuf[64 * 1024]; | 37 | char rbuf[64 * 1024]; |
38 | struct GNUNET_CRYPTO_AesSessionKey sk; | 38 | struct GNUNET_CRYPTO_SymmetricSessionKey sk; |
39 | struct GNUNET_CRYPTO_AesInitializationVector iv; | 39 | struct GNUNET_CRYPTO_SymmetricInitializationVector iv; |
40 | 40 | ||
41 | GNUNET_CRYPTO_aes_create_session_key (&sk); | 41 | GNUNET_CRYPTO_symmetric_create_session_key (&sk); |
42 | 42 | ||
43 | memset (buf, 1, sizeof (buf)); | 43 | memset (buf, 1, sizeof (buf)); |
44 | for (i = 0; i < 1024; i++) | 44 | for (i = 0; i < 1024; i++) |
45 | { | 45 | { |
46 | memset (&iv, (int8_t) i, sizeof (iv)); | 46 | memset (&iv, (int8_t) i, sizeof (iv)); |
47 | GNUNET_CRYPTO_aes_encrypt (buf, sizeof (buf), | 47 | GNUNET_CRYPTO_symmetric_encrypt (buf, sizeof (buf), |
48 | &sk, &iv, | 48 | &sk, &iv, |
49 | rbuf); | 49 | rbuf); |
50 | GNUNET_CRYPTO_aes_decrypt (rbuf, sizeof (buf), | 50 | GNUNET_CRYPTO_symmetric_decrypt (rbuf, sizeof (buf), |
51 | &sk, &iv, | 51 | &sk, &iv, |
52 | buf); | 52 | buf); |
53 | } | 53 | } |
diff --git a/src/util/test_crypto_hash.c b/src/util/test_crypto_hash.c index 2a5d6d773..9e10702ce 100644 --- a/src/util/test_crypto_hash.c +++ b/src/util/test_crypto_hash.c | |||
@@ -69,8 +69,8 @@ testArithmetic () | |||
69 | struct GNUNET_HashCode h2; | 69 | struct GNUNET_HashCode h2; |
70 | struct GNUNET_HashCode d; | 70 | struct GNUNET_HashCode d; |
71 | struct GNUNET_HashCode s; | 71 | struct GNUNET_HashCode s; |
72 | struct GNUNET_CRYPTO_AesSessionKey skey; | 72 | struct GNUNET_CRYPTO_SymmetricSessionKey skey; |
73 | struct GNUNET_CRYPTO_AesInitializationVector iv; | 73 | struct GNUNET_CRYPTO_SymmetricInitializationVector iv; |
74 | 74 | ||
75 | GNUNET_CRYPTO_hash_create_random (GNUNET_CRYPTO_QUALITY_WEAK, &h1); | 75 | GNUNET_CRYPTO_hash_create_random (GNUNET_CRYPTO_QUALITY_WEAK, &h1); |
76 | GNUNET_CRYPTO_hash_create_random (GNUNET_CRYPTO_QUALITY_WEAK, &h2); | 76 | GNUNET_CRYPTO_hash_create_random (GNUNET_CRYPTO_QUALITY_WEAK, &h2); |
diff --git a/src/util/test_crypto_aes.c b/src/util/test_crypto_symmetric.c index a5d49063a..b350e9efe 100644 --- a/src/util/test_crypto_aes.c +++ b/src/util/test_crypto_symmetric.c | |||
@@ -20,7 +20,7 @@ | |||
20 | */ | 20 | */ |
21 | /** | 21 | /** |
22 | * @author Christian Grothoff | 22 | * @author Christian Grothoff |
23 | * @file util/test_crypto_aes.c | 23 | * @file util/test_crypto_symmetric.c |
24 | * @brief test for AES ciphers | 24 | * @brief test for AES ciphers |
25 | */ | 25 | */ |
26 | #include "platform.h" | 26 | #include "platform.h" |
@@ -33,16 +33,16 @@ | |||
33 | static int | 33 | static int |
34 | testSymcipher () | 34 | testSymcipher () |
35 | { | 35 | { |
36 | struct GNUNET_CRYPTO_AesSessionKey key; | 36 | struct GNUNET_CRYPTO_SymmetricSessionKey key; |
37 | char result[100]; | 37 | char result[100]; |
38 | int size; | 38 | int size; |
39 | char res[100]; | 39 | char res[100]; |
40 | 40 | ||
41 | GNUNET_CRYPTO_aes_create_session_key (&key); | 41 | GNUNET_CRYPTO_symmetric_create_session_key (&key); |
42 | size = | 42 | size = |
43 | GNUNET_CRYPTO_aes_encrypt (TESTSTRING, strlen (TESTSTRING) + 1, &key, | 43 | GNUNET_CRYPTO_symmetric_encrypt (TESTSTRING, strlen (TESTSTRING) + 1, &key, |
44 | (const struct | 44 | (const struct |
45 | GNUNET_CRYPTO_AesInitializationVector *) | 45 | GNUNET_CRYPTO_SymmetricInitializationVector *) |
46 | INITVALUE, result); | 46 | INITVALUE, result); |
47 | if (size == -1) | 47 | if (size == -1) |
48 | { | 48 | { |
@@ -50,9 +50,9 @@ testSymcipher () | |||
50 | return 1; | 50 | return 1; |
51 | } | 51 | } |
52 | size = | 52 | size = |
53 | GNUNET_CRYPTO_aes_decrypt (result, size, &key, | 53 | GNUNET_CRYPTO_symmetric_decrypt (result, size, &key, |
54 | (const struct | 54 | (const struct |
55 | GNUNET_CRYPTO_AesInitializationVector *) | 55 | GNUNET_CRYPTO_SymmetricInitializationVector *) |
56 | INITVALUE, res); | 56 | INITVALUE, res); |
57 | if (strlen (TESTSTRING) + 1 != size) | 57 | if (strlen (TESTSTRING) + 1 != size) |
58 | { | 58 | { |
@@ -72,7 +72,7 @@ testSymcipher () | |||
72 | static int | 72 | static int |
73 | verifyCrypto () | 73 | verifyCrypto () |
74 | { | 74 | { |
75 | struct GNUNET_CRYPTO_AesSessionKey key; | 75 | struct GNUNET_CRYPTO_SymmetricSessionKey key; |
76 | char result[GNUNET_CRYPTO_AES_KEY_LENGTH]; | 76 | char result[GNUNET_CRYPTO_AES_KEY_LENGTH]; |
77 | char *res; | 77 | char *res; |
78 | int ret; | 78 | int ret; |
@@ -107,9 +107,9 @@ verifyCrypto () | |||
107 | memcpy (key.aes_key, raw_key_aes, GNUNET_CRYPTO_AES_KEY_LENGTH); | 107 | memcpy (key.aes_key, raw_key_aes, GNUNET_CRYPTO_AES_KEY_LENGTH); |
108 | memcpy (key.twofish_key, raw_key_twofish, GNUNET_CRYPTO_AES_KEY_LENGTH); | 108 | memcpy (key.twofish_key, raw_key_twofish, GNUNET_CRYPTO_AES_KEY_LENGTH); |
109 | if (GNUNET_CRYPTO_AES_KEY_LENGTH != | 109 | if (GNUNET_CRYPTO_AES_KEY_LENGTH != |
110 | GNUNET_CRYPTO_aes_encrypt (plain, GNUNET_CRYPTO_AES_KEY_LENGTH, &key, | 110 | GNUNET_CRYPTO_symmetric_encrypt (plain, GNUNET_CRYPTO_AES_KEY_LENGTH, &key, |
111 | (const struct | 111 | (const struct |
112 | GNUNET_CRYPTO_AesInitializationVector *) | 112 | GNUNET_CRYPTO_SymmetricInitializationVector *) |
113 | "testtesttesttest", result)) | 113 | "testtesttesttest", result)) |
114 | { | 114 | { |
115 | printf ("Wrong return value from encrypt block.\n"); | 115 | printf ("Wrong return value from encrypt block.\n"); |
@@ -129,9 +129,9 @@ verifyCrypto () | |||
129 | 129 | ||
130 | res = GNUNET_malloc (GNUNET_CRYPTO_AES_KEY_LENGTH); | 130 | res = GNUNET_malloc (GNUNET_CRYPTO_AES_KEY_LENGTH); |
131 | if (GNUNET_CRYPTO_AES_KEY_LENGTH != | 131 | if (GNUNET_CRYPTO_AES_KEY_LENGTH != |
132 | GNUNET_CRYPTO_aes_decrypt (result, GNUNET_CRYPTO_AES_KEY_LENGTH, &key, | 132 | GNUNET_CRYPTO_symmetric_decrypt (result, GNUNET_CRYPTO_AES_KEY_LENGTH, &key, |
133 | (const struct | 133 | (const struct |
134 | GNUNET_CRYPTO_AesInitializationVector *) | 134 | GNUNET_CRYPTO_SymmetricInitializationVector *) |
135 | "testtesttesttest", res)) | 135 | "testtesttesttest", res)) |
136 | { | 136 | { |
137 | printf ("Wrong return value from decrypt block.\n"); | 137 | printf ("Wrong return value from decrypt block.\n"); |
@@ -156,7 +156,7 @@ main (int argc, char *argv[]) | |||
156 | 156 | ||
157 | GNUNET_log_setup ("test-crypto-aes", "WARNING", NULL); | 157 | GNUNET_log_setup ("test-crypto-aes", "WARNING", NULL); |
158 | GNUNET_assert (strlen (INITVALUE) > | 158 | GNUNET_assert (strlen (INITVALUE) > |
159 | sizeof (struct GNUNET_CRYPTO_AesInitializationVector)); | 159 | sizeof (struct GNUNET_CRYPTO_SymmetricInitializationVector)); |
160 | failureCount += testSymcipher (); | 160 | failureCount += testSymcipher (); |
161 | failureCount += verifyCrypto (); | 161 | failureCount += verifyCrypto (); |
162 | 162 | ||