aboutsummaryrefslogtreecommitdiff
path: root/src/util
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2013-08-21 15:34:18 +0000
committerChristian Grothoff <christian@grothoff.org>2013-08-21 15:34:18 +0000
commit65e91346db9fe4ca1b1ff6516872454c468eb7f2 (patch)
tree4228cfb2c3b628f6dd011f8b73075ecb86343217 /src/util
parent47386fdbe2b5945fc2c319ef6899e3b67157d04f (diff)
downloadgnunet-65e91346db9fe4ca1b1ff6516872454c468eb7f2.tar.gz
gnunet-65e91346db9fe4ca1b1ff6516872454c468eb7f2.zip
removing GNUNET_CRYPTO_ecc_key_free, use GNUNET_free directly instead
Diffstat (limited to 'src/util')
-rw-r--r--src/util/crypto_ecc.c16
-rw-r--r--src/util/gnunet-ecc.c6
-rw-r--r--src/util/test_crypto_ecc.c24
3 files changed, 17 insertions, 29 deletions
diff --git a/src/util/crypto_ecc.c b/src/util/crypto_ecc.c
index 89cbde922..5ad0b81cb 100644
--- a/src/util/crypto_ecc.c
+++ b/src/util/crypto_ecc.c
@@ -53,18 +53,6 @@
53 53
54 54
55/** 55/**
56 * Free memory occupied by ECC key
57 *
58 * @param priv pointer to the memory to free
59 */
60void
61GNUNET_CRYPTO_ecc_key_free (struct GNUNET_CRYPTO_EccPrivateKey *priv)
62{
63 GNUNET_free (priv);
64}
65
66
67/**
68 * Extract values from an S-expression. 56 * Extract values from an S-expression.
69 * 57 *
70 * @param array where to store the result(s) 58 * @param array where to store the result(s)
@@ -668,7 +656,7 @@ GNUNET_CRYPTO_ecc_setup_key (const char *cfg_name)
668 (void) GNUNET_CONFIGURATION_load (cfg, cfg_name); 656 (void) GNUNET_CONFIGURATION_load (cfg, cfg_name);
669 priv = GNUNET_CRYPTO_ecc_key_create_from_configuration (cfg); 657 priv = GNUNET_CRYPTO_ecc_key_create_from_configuration (cfg);
670 if (NULL != priv) 658 if (NULL != priv)
671 GNUNET_CRYPTO_ecc_key_free (priv); 659 GNUNET_free (priv);
672 GNUNET_CONFIGURATION_destroy (cfg); 660 GNUNET_CONFIGURATION_destroy (cfg);
673} 661}
674 662
@@ -695,7 +683,7 @@ GNUNET_CRYPTO_get_host_identity (const struct GNUNET_CONFIGURATION_Handle *cfg,
695 return GNUNET_SYSERR; 683 return GNUNET_SYSERR;
696 } 684 }
697 GNUNET_CRYPTO_ecc_key_get_public (priv, &pub); 685 GNUNET_CRYPTO_ecc_key_get_public (priv, &pub);
698 GNUNET_CRYPTO_ecc_key_free (priv); 686 GNUNET_free (priv);
699 GNUNET_CRYPTO_hash (&pub, sizeof (pub), &dst->hashPubKey); 687 GNUNET_CRYPTO_hash (&pub, sizeof (pub), &dst->hashPubKey);
700 return GNUNET_OK; 688 return GNUNET_OK;
701} 689}
diff --git a/src/util/gnunet-ecc.c b/src/util/gnunet-ecc.c
index 103f8eff2..4f20d3208 100644
--- a/src/util/gnunet-ecc.c
+++ b/src/util/gnunet-ecc.c
@@ -82,10 +82,10 @@ create_keys (const char *fn)
82 _("\nFailed to write to `%s': %s\n"), 82 _("\nFailed to write to `%s': %s\n"),
83 fn, 83 fn,
84 STRERROR (errno)); 84 STRERROR (errno));
85 GNUNET_CRYPTO_ecc_key_free (pk); 85 GNUNET_free (pk);
86 break; 86 break;
87 } 87 }
88 GNUNET_CRYPTO_ecc_key_free (pk); 88 GNUNET_free (pk);
89 } 89 }
90 if (UINT_MAX == make_keys) 90 if (UINT_MAX == make_keys)
91 fprintf (stderr, 91 fprintf (stderr,
@@ -144,7 +144,7 @@ run (void *cls, char *const *args, const char *cfgfile,
144 GNUNET_CRYPTO_hash_to_enc (&pid.hashPubKey, &enc); 144 GNUNET_CRYPTO_hash_to_enc (&pid.hashPubKey, &enc);
145 fprintf (stdout, "%s\n", enc.encoding); 145 fprintf (stdout, "%s\n", enc.encoding);
146 } 146 }
147 GNUNET_CRYPTO_ecc_key_free (pk); 147 GNUNET_free (pk);
148} 148}
149 149
150 150
diff --git a/src/util/test_crypto_ecc.c b/src/util/test_crypto_ecc.c
index bb5fb002f..58a9816a2 100644
--- a/src/util/test_crypto_ecc.c
+++ b/src/util/test_crypto_ecc.c
@@ -104,7 +104,7 @@ testDeriveSignVerify ()
104 if (GNUNET_SYSERR == GNUNET_CRYPTO_ecc_sign (dpriv, &purp, &sig)) 104 if (GNUNET_SYSERR == GNUNET_CRYPTO_ecc_sign (dpriv, &purp, &sig))
105 { 105 {
106 FPRINTF (stderr, "%s", "GNUNET_CRYPTO_ecc_sign returned SYSERR\n"); 106 FPRINTF (stderr, "%s", "GNUNET_CRYPTO_ecc_sign returned SYSERR\n");
107 GNUNET_CRYPTO_ecc_key_free (dpriv); 107 GNUNET_free (dpriv);
108 return GNUNET_SYSERR; 108 return GNUNET_SYSERR;
109 } 109 }
110 if (GNUNET_SYSERR == 110 if (GNUNET_SYSERR ==
@@ -113,7 +113,7 @@ testDeriveSignVerify ()
113 &dpub)) 113 &dpub))
114 { 114 {
115 printf ("GNUNET_CRYPTO_ecc_verify failed!\n"); 115 printf ("GNUNET_CRYPTO_ecc_verify failed!\n");
116 GNUNET_CRYPTO_ecc_key_free (dpriv); 116 GNUNET_free (dpriv);
117 return GNUNET_SYSERR; 117 return GNUNET_SYSERR;
118 } 118 }
119 if (GNUNET_SYSERR != 119 if (GNUNET_SYSERR !=
@@ -122,7 +122,7 @@ testDeriveSignVerify ()
122 &pkey)) 122 &pkey))
123 { 123 {
124 printf ("GNUNET_CRYPTO_ecc_verify failed to fail!\n"); 124 printf ("GNUNET_CRYPTO_ecc_verify failed to fail!\n");
125 GNUNET_CRYPTO_ecc_key_free (dpriv); 125 GNUNET_free (dpriv);
126 return GNUNET_SYSERR; 126 return GNUNET_SYSERR;
127 } 127 }
128 if (GNUNET_SYSERR != 128 if (GNUNET_SYSERR !=
@@ -130,10 +130,10 @@ testDeriveSignVerify ()
130 &purp, &sig, &dpub)) 130 &purp, &sig, &dpub))
131 { 131 {
132 printf ("GNUNET_CRYPTO_ecc_verify failed to fail!\n"); 132 printf ("GNUNET_CRYPTO_ecc_verify failed to fail!\n");
133 GNUNET_CRYPTO_ecc_key_free (dpriv); 133 GNUNET_free (dpriv);
134 return GNUNET_SYSERR; 134 return GNUNET_SYSERR;
135 } 135 }
136 GNUNET_CRYPTO_ecc_key_free (dpriv); 136 GNUNET_free (dpriv);
137 return GNUNET_OK; 137 return GNUNET_OK;
138} 138}
139 139
@@ -183,18 +183,18 @@ testCreateFromFile ()
183 key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE); 183 key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE);
184 GNUNET_assert (NULL != key); 184 GNUNET_assert (NULL != key);
185 GNUNET_CRYPTO_ecc_key_get_public (key, &p1); 185 GNUNET_CRYPTO_ecc_key_get_public (key, &p1);
186 GNUNET_CRYPTO_ecc_key_free (key); 186 GNUNET_free (key);
187 key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE); 187 key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE);
188 GNUNET_assert (NULL != key); 188 GNUNET_assert (NULL != key);
189 GNUNET_CRYPTO_ecc_key_get_public (key, &p2); 189 GNUNET_CRYPTO_ecc_key_get_public (key, &p2);
190 GNUNET_assert (0 == memcmp (&p1, &p2, sizeof (p1))); 190 GNUNET_assert (0 == memcmp (&p1, &p2, sizeof (p1)));
191 GNUNET_CRYPTO_ecc_key_free (key); 191 GNUNET_free (key);
192 GNUNET_assert (0 == UNLINK (KEYFILE)); 192 GNUNET_assert (0 == UNLINK (KEYFILE));
193 key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE); 193 key = GNUNET_CRYPTO_ecc_key_create_from_file (KEYFILE);
194 GNUNET_assert (NULL != key); 194 GNUNET_assert (NULL != key);
195 GNUNET_CRYPTO_ecc_key_get_public (key, &p2); 195 GNUNET_CRYPTO_ecc_key_get_public (key, &p2);
196 GNUNET_assert (0 != memcmp (&p1, &p2, sizeof (p1))); 196 GNUNET_assert (0 != memcmp (&p1, &p2, sizeof (p1)));
197 GNUNET_CRYPTO_ecc_key_free (key); 197 GNUNET_free (key);
198 return GNUNET_OK; 198 return GNUNET_OK;
199} 199}
200 200
@@ -217,8 +217,8 @@ test_ecdh ()
217 GNUNET_CRYPTO_ecc_ecdh (priv2, &pub1, &ecdh2); 217 GNUNET_CRYPTO_ecc_ecdh (priv2, &pub1, &ecdh2);
218 GNUNET_assert (0 == memcmp (&ecdh1, &ecdh2, 218 GNUNET_assert (0 == memcmp (&ecdh1, &ecdh2,
219 sizeof (struct GNUNET_HashCode))); 219 sizeof (struct GNUNET_HashCode)));
220 GNUNET_CRYPTO_ecc_key_free (priv1); 220 GNUNET_free (priv1);
221 GNUNET_CRYPTO_ecc_key_free (priv2); 221 GNUNET_free (priv2);
222} 222}
223 223
224 224
@@ -234,7 +234,7 @@ perf_keygen ()
234 { 234 {
235 fprintf (stderr, "."); 235 fprintf (stderr, ".");
236 pk = GNUNET_CRYPTO_ecc_key_create (); 236 pk = GNUNET_CRYPTO_ecc_key_create ();
237 GNUNET_CRYPTO_ecc_key_free (pk); 237 GNUNET_free (pk);
238 } 238 }
239 fprintf (stderr, "\n"); 239 fprintf (stderr, "\n");
240 printf ("Creating 10 ECC keys took %s\n", 240 printf ("Creating 10 ECC keys took %s\n",
@@ -270,7 +270,7 @@ main (int argc, char *argv[])
270#endif 270#endif
271 if (GNUNET_OK != testSignVerify ()) 271 if (GNUNET_OK != testSignVerify ())
272 failure_count++; 272 failure_count++;
273 GNUNET_CRYPTO_ecc_key_free (key); 273 GNUNET_free (key);
274 if (GNUNET_OK != testCreateFromFile ()) 274 if (GNUNET_OK != testCreateFromFile ())
275 failure_count++; 275 failure_count++;
276 GNUNET_assert (0 == UNLINK (KEYFILE)); 276 GNUNET_assert (0 == UNLINK (KEYFILE));