diff options
Diffstat (limited to 'src/namestore')
24 files changed, 212 insertions, 212 deletions
diff --git a/src/namestore/gnunet-namestore-fcfsd.c b/src/namestore/gnunet-namestore-fcfsd.c index 7455c0ba5..08f03a055 100644 --- a/src/namestore/gnunet-namestore-fcfsd.c +++ b/src/namestore/gnunet-namestore-fcfsd.c | |||
@@ -196,7 +196,7 @@ static struct GNUNET_NAMESTORE_Handle *ns; | |||
196 | /** | 196 | /** |
197 | * Private key for the fcfsd zone. | 197 | * Private key for the fcfsd zone. |
198 | */ | 198 | */ |
199 | static struct GNUNET_CRYPTO_EccPrivateKey fcfs_zone_pkey; | 199 | static struct GNUNET_CRYPTO_EcdsaPrivateKey fcfs_zone_pkey; |
200 | 200 | ||
201 | /** | 201 | /** |
202 | * Connection to identity service. | 202 | * Connection to identity service. |
@@ -242,7 +242,7 @@ run_httpd_now () | |||
242 | 242 | ||
243 | static void | 243 | static void |
244 | iterate_cb (void *cls, | 244 | iterate_cb (void *cls, |
245 | const struct GNUNET_CRYPTO_EccPrivateKey *zone_key, | 245 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key, |
246 | const char *name, | 246 | const char *name, |
247 | unsigned int rd_len, | 247 | unsigned int rd_len, |
248 | const struct GNUNET_NAMESTORE_RecordData *rd) | 248 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -504,14 +504,14 @@ put_continuation (void *cls, | |||
504 | */ | 504 | */ |
505 | static void | 505 | static void |
506 | zone_to_name_cb (void *cls, | 506 | zone_to_name_cb (void *cls, |
507 | const struct GNUNET_CRYPTO_EccPrivateKey *zone_key, | 507 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key, |
508 | const char *name, | 508 | const char *name, |
509 | unsigned int rd_count, | 509 | unsigned int rd_count, |
510 | const struct GNUNET_NAMESTORE_RecordData *rd) | 510 | const struct GNUNET_NAMESTORE_RecordData *rd) |
511 | { | 511 | { |
512 | struct Request *request = cls; | 512 | struct Request *request = cls; |
513 | struct GNUNET_NAMESTORE_RecordData r; | 513 | struct GNUNET_NAMESTORE_RecordData r; |
514 | struct GNUNET_CRYPTO_EccPublicSignKey pub; | 514 | struct GNUNET_CRYPTO_EcdsaPublicKey pub; |
515 | 515 | ||
516 | request->qe = NULL; | 516 | request->qe = NULL; |
517 | if (NULL != name) | 517 | if (NULL != name) |
@@ -523,7 +523,7 @@ zone_to_name_cb (void *cls, | |||
523 | run_httpd_now (); | 523 | run_httpd_now (); |
524 | return; | 524 | return; |
525 | } | 525 | } |
526 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (zone_key, | 526 | GNUNET_CRYPTO_ecdsa_key_get_public (zone_key, |
527 | &pub); | 527 | &pub); |
528 | r.data = &pub; | 528 | r.data = &pub; |
529 | r.data_size = sizeof (pub); | 529 | r.data_size = sizeof (pub); |
@@ -554,7 +554,7 @@ lookup_result_processor (void *cls, | |||
554 | const struct GNUNET_NAMESTORE_RecordData *rd) | 554 | const struct GNUNET_NAMESTORE_RecordData *rd) |
555 | { | 555 | { |
556 | struct Request *request = cls; | 556 | struct Request *request = cls; |
557 | struct GNUNET_CRYPTO_EccPublicSignKey pub; | 557 | struct GNUNET_CRYPTO_EcdsaPublicKey pub; |
558 | 558 | ||
559 | if (0 != rd_count) | 559 | if (0 != rd_count) |
560 | { | 560 | { |
@@ -567,7 +567,7 @@ lookup_result_processor (void *cls, | |||
567 | return; | 567 | return; |
568 | } | 568 | } |
569 | if (GNUNET_OK != | 569 | if (GNUNET_OK != |
570 | GNUNET_CRYPTO_ecc_public_sign_key_from_string (request->public_key, | 570 | GNUNET_CRYPTO_ecdsa_public_key_from_string (request->public_key, |
571 | strlen (request->public_key), | 571 | strlen (request->public_key), |
572 | &pub)) | 572 | &pub)) |
573 | { | 573 | { |
@@ -596,7 +596,7 @@ lookup_block_processor (void *cls, | |||
596 | const struct GNUNET_NAMESTORE_Block *block) | 596 | const struct GNUNET_NAMESTORE_Block *block) |
597 | { | 597 | { |
598 | struct Request *request = cls; | 598 | struct Request *request = cls; |
599 | struct GNUNET_CRYPTO_EccPublicSignKey pub; | 599 | struct GNUNET_CRYPTO_EcdsaPublicKey pub; |
600 | 600 | ||
601 | request->qe = NULL; | 601 | request->qe = NULL; |
602 | if (NULL == block) | 602 | if (NULL == block) |
@@ -604,7 +604,7 @@ lookup_block_processor (void *cls, | |||
604 | lookup_result_processor (request, 0, NULL); | 604 | lookup_result_processor (request, 0, NULL); |
605 | return; | 605 | return; |
606 | } | 606 | } |
607 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (&fcfs_zone_pkey, | 607 | GNUNET_CRYPTO_ecdsa_key_get_public (&fcfs_zone_pkey, |
608 | &pub); | 608 | &pub); |
609 | if (GNUNET_OK != | 609 | if (GNUNET_OK != |
610 | GNUNET_NAMESTORE_block_decrypt (block, | 610 | GNUNET_NAMESTORE_block_decrypt (block, |
@@ -657,7 +657,7 @@ create_response (void *cls, | |||
657 | struct MHD_Response *response; | 657 | struct MHD_Response *response; |
658 | struct Request *request; | 658 | struct Request *request; |
659 | int ret; | 659 | int ret; |
660 | struct GNUNET_CRYPTO_EccPublicSignKey pub; | 660 | struct GNUNET_CRYPTO_EcdsaPublicKey pub; |
661 | struct GNUNET_HashCode query; | 661 | struct GNUNET_HashCode query; |
662 | 662 | ||
663 | if ( (0 == strcmp (method, MHD_HTTP_METHOD_GET)) || | 663 | if ( (0 == strcmp (method, MHD_HTTP_METHOD_GET)) || |
@@ -707,7 +707,7 @@ create_response (void *cls, | |||
707 | request->pp = NULL; | 707 | request->pp = NULL; |
708 | } | 708 | } |
709 | if (GNUNET_OK != | 709 | if (GNUNET_OK != |
710 | GNUNET_CRYPTO_ecc_public_sign_key_from_string (request->public_key, | 710 | GNUNET_CRYPTO_ecdsa_public_key_from_string (request->public_key, |
711 | strlen (request->public_key), | 711 | strlen (request->public_key), |
712 | &pub)) | 712 | &pub)) |
713 | { | 713 | { |
@@ -735,7 +735,7 @@ create_response (void *cls, | |||
735 | request, connection); | 735 | request, connection); |
736 | } | 736 | } |
737 | request->phase = RP_LOOKUP; | 737 | request->phase = RP_LOOKUP; |
738 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (&fcfs_zone_pkey, | 738 | GNUNET_CRYPTO_ecdsa_key_get_public (&fcfs_zone_pkey, |
739 | &pub); | 739 | &pub); |
740 | GNUNET_NAMESTORE_query_from_public_key (&pub, | 740 | GNUNET_NAMESTORE_query_from_public_key (&pub, |
741 | request->domain_name, | 741 | request->domain_name, |
@@ -1030,7 +1030,7 @@ main (int argc, char *const *argv) | |||
1030 | options, | 1030 | options, |
1031 | &run, NULL)) ? 0 : 1; | 1031 | &run, NULL)) ? 0 : 1; |
1032 | GNUNET_free ((void*) argv); | 1032 | GNUNET_free ((void*) argv); |
1033 | GNUNET_CRYPTO_ecc_key_clear (&fcfs_zone_pkey); | 1033 | GNUNET_CRYPTO_ecdsa_key_clear (&fcfs_zone_pkey); |
1034 | return ret; | 1034 | return ret; |
1035 | } | 1035 | } |
1036 | 1036 | ||
diff --git a/src/namestore/gnunet-namestore.c b/src/namestore/gnunet-namestore.c index 2ff640604..322030e65 100644 --- a/src/namestore/gnunet-namestore.c +++ b/src/namestore/gnunet-namestore.c | |||
@@ -41,7 +41,7 @@ static struct GNUNET_NAMESTORE_Handle *ns; | |||
41 | /** | 41 | /** |
42 | * Private key for the our zone. | 42 | * Private key for the our zone. |
43 | */ | 43 | */ |
44 | static struct GNUNET_CRYPTO_EccPrivateKey zone_pkey; | 44 | static struct GNUNET_CRYPTO_EcdsaPrivateKey zone_pkey; |
45 | 45 | ||
46 | /** | 46 | /** |
47 | * Handle to identity lookup. | 47 | * Handle to identity lookup. |
@@ -334,7 +334,7 @@ del_continuation (void *cls, | |||
334 | */ | 334 | */ |
335 | static void | 335 | static void |
336 | display_record (void *cls, | 336 | display_record (void *cls, |
337 | const struct GNUNET_CRYPTO_EccPrivateKey *zone_key, | 337 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key, |
338 | const char *name, | 338 | const char *name, |
339 | unsigned int rd_len, | 339 | unsigned int rd_len, |
340 | const struct GNUNET_NAMESTORE_RecordData *rd) | 340 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -413,7 +413,7 @@ sync_cb (void *cls) | |||
413 | */ | 413 | */ |
414 | static void | 414 | static void |
415 | get_existing_record (void *cls, | 415 | get_existing_record (void *cls, |
416 | const struct GNUNET_CRYPTO_EccPrivateKey *zone_key, | 416 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key, |
417 | const char *rec_name, | 417 | const char *rec_name, |
418 | unsigned int rd_count, | 418 | unsigned int rd_count, |
419 | const struct GNUNET_NAMESTORE_RecordData *rd) | 419 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -524,10 +524,10 @@ static void | |||
524 | handle_block (void *cls, | 524 | handle_block (void *cls, |
525 | const struct GNUNET_NAMESTORE_Block *block) | 525 | const struct GNUNET_NAMESTORE_Block *block) |
526 | { | 526 | { |
527 | struct GNUNET_CRYPTO_EccPublicSignKey zone_pubkey; | 527 | struct GNUNET_CRYPTO_EcdsaPublicKey zone_pubkey; |
528 | 528 | ||
529 | list_qe = NULL; | 529 | list_qe = NULL; |
530 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (&zone_pkey, | 530 | GNUNET_CRYPTO_ecdsa_key_get_public (&zone_pkey, |
531 | &zone_pubkey); | 531 | &zone_pubkey); |
532 | if (NULL == block) | 532 | if (NULL == block) |
533 | { | 533 | { |
@@ -560,7 +560,7 @@ handle_block (void *cls, | |||
560 | */ | 560 | */ |
561 | static void | 561 | static void |
562 | handle_reverse_lookup (void *cls, | 562 | handle_reverse_lookup (void *cls, |
563 | const struct GNUNET_CRYPTO_EccPrivateKey *zone, | 563 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone, |
564 | const char *label, | 564 | const char *label, |
565 | unsigned int rd_count, | 565 | unsigned int rd_count, |
566 | const struct GNUNET_NAMESTORE_RecordData *rd) | 566 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -591,7 +591,7 @@ testservice_task (void *cls, | |||
591 | int result) | 591 | int result) |
592 | { | 592 | { |
593 | const struct GNUNET_CONFIGURATION_Handle *cfg = cls; | 593 | const struct GNUNET_CONFIGURATION_Handle *cfg = cls; |
594 | struct GNUNET_CRYPTO_EccPublicSignKey pub; | 594 | struct GNUNET_CRYPTO_EcdsaPublicKey pub; |
595 | struct GNUNET_NAMESTORE_RecordData rd; | 595 | struct GNUNET_NAMESTORE_RecordData rd; |
596 | 596 | ||
597 | if (GNUNET_YES != result) | 597 | if (GNUNET_YES != result) |
@@ -608,7 +608,7 @@ testservice_task (void *cls, | |||
608 | GNUNET_SCHEDULER_shutdown (); | 608 | GNUNET_SCHEDULER_shutdown (); |
609 | return; | 609 | return; |
610 | } | 610 | } |
611 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (&zone_pkey, | 611 | GNUNET_CRYPTO_ecdsa_key_get_public (&zone_pkey, |
612 | &pub); | 612 | &pub); |
613 | 613 | ||
614 | ns = GNUNET_NAMESTORE_connect (cfg); | 614 | ns = GNUNET_NAMESTORE_connect (cfg); |
@@ -738,9 +738,9 @@ testservice_task (void *cls, | |||
738 | else | 738 | else |
739 | { | 739 | { |
740 | struct GNUNET_HashCode query; | 740 | struct GNUNET_HashCode query; |
741 | struct GNUNET_CRYPTO_EccPublicSignKey zone_pubkey; | 741 | struct GNUNET_CRYPTO_EcdsaPublicKey zone_pubkey; |
742 | 742 | ||
743 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (&zone_pkey, | 743 | GNUNET_CRYPTO_ecdsa_key_get_public (&zone_pkey, |
744 | &zone_pubkey); | 744 | &zone_pubkey); |
745 | GNUNET_NAMESTORE_query_from_public_key (&zone_pubkey, | 745 | GNUNET_NAMESTORE_query_from_public_key (&zone_pubkey, |
746 | name, | 746 | name, |
@@ -753,10 +753,10 @@ testservice_task (void *cls, | |||
753 | } | 753 | } |
754 | if (NULL != reverse_pkey) | 754 | if (NULL != reverse_pkey) |
755 | { | 755 | { |
756 | struct GNUNET_CRYPTO_EccPublicSignKey pubkey; | 756 | struct GNUNET_CRYPTO_EcdsaPublicKey pubkey; |
757 | 757 | ||
758 | if (GNUNET_OK != | 758 | if (GNUNET_OK != |
759 | GNUNET_CRYPTO_ecc_public_sign_key_from_string (reverse_pkey, | 759 | GNUNET_CRYPTO_ecdsa_public_key_from_string (reverse_pkey, |
760 | strlen (reverse_pkey), | 760 | strlen (reverse_pkey), |
761 | &pubkey)) | 761 | &pubkey)) |
762 | { | 762 | { |
@@ -775,14 +775,14 @@ testservice_task (void *cls, | |||
775 | { | 775 | { |
776 | char sh[105]; | 776 | char sh[105]; |
777 | char sname[64]; | 777 | char sname[64]; |
778 | struct GNUNET_CRYPTO_EccPublicSignKey pkey; | 778 | struct GNUNET_CRYPTO_EcdsaPublicKey pkey; |
779 | 779 | ||
780 | if ( (2 != (sscanf (uri, | 780 | if ( (2 != (sscanf (uri, |
781 | "gnunet://gns/%104s/%63s", | 781 | "gnunet://gns/%104s/%63s", |
782 | sh, | 782 | sh, |
783 | sname)) ) || | 783 | sname)) ) || |
784 | (GNUNET_OK != | 784 | (GNUNET_OK != |
785 | GNUNET_CRYPTO_ecc_public_sign_key_from_string (sh, strlen (sh), &pkey)) ) | 785 | GNUNET_CRYPTO_ecdsa_public_key_from_string (sh, strlen (sh), &pkey)) ) |
786 | { | 786 | { |
787 | fprintf (stderr, | 787 | fprintf (stderr, |
788 | _("Invalid URI `%s'\n"), | 788 | _("Invalid URI `%s'\n"), |
@@ -793,7 +793,7 @@ testservice_task (void *cls, | |||
793 | } | 793 | } |
794 | memset (&rd, 0, sizeof (rd)); | 794 | memset (&rd, 0, sizeof (rd)); |
795 | rd.data = &pkey; | 795 | rd.data = &pkey; |
796 | rd.data_size = sizeof (struct GNUNET_CRYPTO_EccPublicSignKey); | 796 | rd.data_size = sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey); |
797 | rd.record_type = GNUNET_NAMESTORE_TYPE_PKEY; | 797 | rd.record_type = GNUNET_NAMESTORE_TYPE_PKEY; |
798 | if (GNUNET_YES == etime_is_rel) | 798 | if (GNUNET_YES == etime_is_rel) |
799 | { | 799 | { |
@@ -952,11 +952,11 @@ main (int argc, char *const *argv) | |||
952 | &run, NULL)) | 952 | &run, NULL)) |
953 | { | 953 | { |
954 | GNUNET_free ((void*) argv); | 954 | GNUNET_free ((void*) argv); |
955 | GNUNET_CRYPTO_ecc_key_clear (&zone_pkey); | 955 | GNUNET_CRYPTO_ecdsa_key_clear (&zone_pkey); |
956 | return 1; | 956 | return 1; |
957 | } | 957 | } |
958 | GNUNET_free ((void*) argv); | 958 | GNUNET_free ((void*) argv); |
959 | GNUNET_CRYPTO_ecc_key_clear (&zone_pkey); | 959 | GNUNET_CRYPTO_ecdsa_key_clear (&zone_pkey); |
960 | return ret; | 960 | return ret; |
961 | } | 961 | } |
962 | 962 | ||
diff --git a/src/namestore/gnunet-service-namestore.c b/src/namestore/gnunet-service-namestore.c index 49315f6e0..2cce92635 100644 --- a/src/namestore/gnunet-service-namestore.c +++ b/src/namestore/gnunet-service-namestore.c | |||
@@ -64,7 +64,7 @@ struct ZoneIteration | |||
64 | /** | 64 | /** |
65 | * Key of the zone we are iterating over. | 65 | * Key of the zone we are iterating over. |
66 | */ | 66 | */ |
67 | struct GNUNET_CRYPTO_EccPrivateKey zone; | 67 | struct GNUNET_CRYPTO_EcdsaPrivateKey zone; |
68 | 68 | ||
69 | /** | 69 | /** |
70 | * The operation id fot the zone iteration in the response for the client | 70 | * The operation id fot the zone iteration in the response for the client |
@@ -140,7 +140,7 @@ struct ZoneMonitor | |||
140 | /** | 140 | /** |
141 | * Private key of the zone. | 141 | * Private key of the zone. |
142 | */ | 142 | */ |
143 | struct GNUNET_CRYPTO_EccPrivateKey zone; | 143 | struct GNUNET_CRYPTO_EcdsaPrivateKey zone; |
144 | 144 | ||
145 | /** | 145 | /** |
146 | * The operation id fot the zone iteration in the response for the client | 146 | * The operation id fot the zone iteration in the response for the client |
@@ -512,7 +512,7 @@ static void | |||
512 | send_lookup_response (struct GNUNET_SERVER_NotificationContext *nc, | 512 | send_lookup_response (struct GNUNET_SERVER_NotificationContext *nc, |
513 | struct GNUNET_SERVER_Client *client, | 513 | struct GNUNET_SERVER_Client *client, |
514 | uint32_t request_id, | 514 | uint32_t request_id, |
515 | const struct GNUNET_CRYPTO_EccPrivateKey *zone_key, | 515 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key, |
516 | const char *name, | 516 | const char *name, |
517 | unsigned int rd_count, | 517 | unsigned int rd_count, |
518 | const struct GNUNET_NAMESTORE_RecordData *rd) | 518 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -563,7 +563,7 @@ send_lookup_response (struct GNUNET_SERVER_NotificationContext *nc, | |||
563 | * @param rd records stored under the given @a name | 563 | * @param rd records stored under the given @a name |
564 | */ | 564 | */ |
565 | static void | 565 | static void |
566 | refresh_block (const struct GNUNET_CRYPTO_EccPrivateKey *zone_key, | 566 | refresh_block (const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key, |
567 | const char *name, | 567 | const char *name, |
568 | unsigned int rd_count, | 568 | unsigned int rd_count, |
569 | const struct GNUNET_NAMESTORE_RecordData *rd) | 569 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -617,7 +617,7 @@ handle_record_store (void *cls, | |||
617 | const char *rd_ser; | 617 | const char *rd_ser; |
618 | unsigned int rd_count; | 618 | unsigned int rd_count; |
619 | int res; | 619 | int res; |
620 | struct GNUNET_CRYPTO_EccPublicSignKey pubkey; | 620 | struct GNUNET_CRYPTO_EcdsaPublicKey pubkey; |
621 | struct ZoneMonitor *zm; | 621 | struct ZoneMonitor *zm; |
622 | 622 | ||
623 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, | 623 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, |
@@ -670,7 +670,7 @@ handle_record_store (void *cls, | |||
670 | } | 670 | } |
671 | 671 | ||
672 | /* Extracting and converting private key */ | 672 | /* Extracting and converting private key */ |
673 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (&rp_msg->private_key, | 673 | GNUNET_CRYPTO_ecdsa_key_get_public (&rp_msg->private_key, |
674 | &pubkey); | 674 | &pubkey); |
675 | conv_name = GNUNET_NAMESTORE_normalize_string (name_tmp); | 675 | conv_name = GNUNET_NAMESTORE_normalize_string (name_tmp); |
676 | if (NULL == conv_name) | 676 | if (NULL == conv_name) |
@@ -711,7 +711,7 @@ handle_record_store (void *cls, | |||
711 | 711 | ||
712 | for (zm = monitor_head; NULL != zm; zm = zm->next) | 712 | for (zm = monitor_head; NULL != zm; zm = zm->next) |
713 | if (0 == memcmp (&rp_msg->private_key, &zm->zone, | 713 | if (0 == memcmp (&rp_msg->private_key, &zm->zone, |
714 | sizeof (struct GNUNET_CRYPTO_EccPrivateKey))) | 714 | sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey))) |
715 | send_lookup_response (monitor_nc, | 715 | send_lookup_response (monitor_nc, |
716 | zm->nc->client, | 716 | zm->nc->client, |
717 | zm->request_id, | 717 | zm->request_id, |
@@ -774,7 +774,7 @@ struct ZoneToNameCtx | |||
774 | */ | 774 | */ |
775 | static void | 775 | static void |
776 | handle_zone_to_name_it (void *cls, | 776 | handle_zone_to_name_it (void *cls, |
777 | const struct GNUNET_CRYPTO_EccPrivateKey *zone_key, | 777 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key, |
778 | const char *name, | 778 | const char *name, |
779 | unsigned int rd_count, | 779 | unsigned int rd_count, |
780 | const struct GNUNET_NAMESTORE_RecordData *rd) | 780 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -936,7 +936,7 @@ struct ZoneIterationProcResult | |||
936 | */ | 936 | */ |
937 | static void | 937 | static void |
938 | zone_iteraterate_proc (void *cls, | 938 | zone_iteraterate_proc (void *cls, |
939 | const struct GNUNET_CRYPTO_EccPrivateKey *zone_key, | 939 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key, |
940 | const char *name, | 940 | const char *name, |
941 | unsigned int rd_count, | 941 | unsigned int rd_count, |
942 | const struct GNUNET_NAMESTORE_RecordData *rd) | 942 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -992,7 +992,7 @@ zone_iteraterate_proc (void *cls, | |||
992 | static void | 992 | static void |
993 | run_zone_iteration_round (struct ZoneIteration *zi) | 993 | run_zone_iteration_round (struct ZoneIteration *zi) |
994 | { | 994 | { |
995 | static struct GNUNET_CRYPTO_EccPrivateKey zero; | 995 | static struct GNUNET_CRYPTO_EcdsaPrivateKey zero; |
996 | struct ZoneIterationProcResult proc; | 996 | struct ZoneIterationProcResult proc; |
997 | struct RecordResultMessage rrm; | 997 | struct RecordResultMessage rrm; |
998 | int ret; | 998 | int ret; |
@@ -1198,7 +1198,7 @@ monitor_next (void *cls, | |||
1198 | */ | 1198 | */ |
1199 | static void | 1199 | static void |
1200 | monitor_iterate_cb (void *cls, | 1200 | monitor_iterate_cb (void *cls, |
1201 | const struct GNUNET_CRYPTO_EccPrivateKey *zone_key, | 1201 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key, |
1202 | const char *name, | 1202 | const char *name, |
1203 | unsigned int rd_count, | 1203 | unsigned int rd_count, |
1204 | const struct GNUNET_NAMESTORE_RecordData *rd) | 1204 | const struct GNUNET_NAMESTORE_RecordData *rd) |
diff --git a/src/namestore/namestore.h b/src/namestore/namestore.h index a8851e104..4350dbab4 100644 --- a/src/namestore/namestore.h +++ b/src/namestore/namestore.h | |||
@@ -88,12 +88,12 @@ struct LookupBlockResponseMessage | |||
88 | /** | 88 | /** |
89 | * Signature. | 89 | * Signature. |
90 | */ | 90 | */ |
91 | struct GNUNET_CRYPTO_EccSignature signature; | 91 | struct GNUNET_CRYPTO_EcdsaSignature signature; |
92 | 92 | ||
93 | /** | 93 | /** |
94 | * Derived public key. | 94 | * Derived public key. |
95 | */ | 95 | */ |
96 | struct GNUNET_CRYPTO_EccPublicSignKey derived_key; | 96 | struct GNUNET_CRYPTO_EcdsaPublicKey derived_key; |
97 | 97 | ||
98 | /* follwed by encrypted block data */ | 98 | /* follwed by encrypted block data */ |
99 | }; | 99 | }; |
@@ -117,12 +117,12 @@ struct BlockCacheMessage | |||
117 | /** | 117 | /** |
118 | * Signature. | 118 | * Signature. |
119 | */ | 119 | */ |
120 | struct GNUNET_CRYPTO_EccSignature signature; | 120 | struct GNUNET_CRYPTO_EcdsaSignature signature; |
121 | 121 | ||
122 | /** | 122 | /** |
123 | * Derived public key. | 123 | * Derived public key. |
124 | */ | 124 | */ |
125 | struct GNUNET_CRYPTO_EccPublicSignKey derived_key; | 125 | struct GNUNET_CRYPTO_EcdsaPublicKey derived_key; |
126 | 126 | ||
127 | /* follwed by encrypted block data */ | 127 | /* follwed by encrypted block data */ |
128 | }; | 128 | }; |
@@ -183,7 +183,7 @@ struct RecordStoreMessage | |||
183 | /** | 183 | /** |
184 | * The private key of the authority. | 184 | * The private key of the authority. |
185 | */ | 185 | */ |
186 | struct GNUNET_CRYPTO_EccPrivateKey private_key; | 186 | struct GNUNET_CRYPTO_EcdsaPrivateKey private_key; |
187 | 187 | ||
188 | /* followed by: | 188 | /* followed by: |
189 | * name with length name_len | 189 | * name with length name_len |
@@ -223,12 +223,12 @@ struct ZoneToNameMessage | |||
223 | /** | 223 | /** |
224 | * The private key of the zone to look up in | 224 | * The private key of the zone to look up in |
225 | */ | 225 | */ |
226 | struct GNUNET_CRYPTO_EccPrivateKey zone; | 226 | struct GNUNET_CRYPTO_EcdsaPrivateKey zone; |
227 | 227 | ||
228 | /** | 228 | /** |
229 | * The public key of the target zone | 229 | * The public key of the target zone |
230 | */ | 230 | */ |
231 | struct GNUNET_CRYPTO_EccPublicSignKey value_zone; | 231 | struct GNUNET_CRYPTO_EcdsaPublicKey value_zone; |
232 | }; | 232 | }; |
233 | 233 | ||
234 | 234 | ||
@@ -266,7 +266,7 @@ struct ZoneToNameResponseMessage | |||
266 | /** | 266 | /** |
267 | * The private key of the zone that contained the name. | 267 | * The private key of the zone that contained the name. |
268 | */ | 268 | */ |
269 | struct GNUNET_CRYPTO_EccPrivateKey zone; | 269 | struct GNUNET_CRYPTO_EcdsaPrivateKey zone; |
270 | 270 | ||
271 | /* followed by: | 271 | /* followed by: |
272 | * name with length name_len | 272 | * name with length name_len |
@@ -309,7 +309,7 @@ struct RecordResultMessage | |||
309 | /** | 309 | /** |
310 | * The private key of the authority. | 310 | * The private key of the authority. |
311 | */ | 311 | */ |
312 | struct GNUNET_CRYPTO_EccPrivateKey private_key; | 312 | struct GNUNET_CRYPTO_EcdsaPrivateKey private_key; |
313 | 313 | ||
314 | /* followed by: | 314 | /* followed by: |
315 | * name with length name_len | 315 | * name with length name_len |
@@ -331,7 +331,7 @@ struct ZoneMonitorStartMessage | |||
331 | /** | 331 | /** |
332 | * Zone key. | 332 | * Zone key. |
333 | */ | 333 | */ |
334 | struct GNUNET_CRYPTO_EccPrivateKey zone; | 334 | struct GNUNET_CRYPTO_EcdsaPrivateKey zone; |
335 | 335 | ||
336 | }; | 336 | }; |
337 | 337 | ||
@@ -349,7 +349,7 @@ struct ZoneIterationStartMessage | |||
349 | /** | 349 | /** |
350 | * Zone key. All zeros for "all zones". | 350 | * Zone key. All zeros for "all zones". |
351 | */ | 351 | */ |
352 | struct GNUNET_CRYPTO_EccPrivateKey zone; | 352 | struct GNUNET_CRYPTO_EcdsaPrivateKey zone; |
353 | 353 | ||
354 | }; | 354 | }; |
355 | 355 | ||
diff --git a/src/namestore/namestore_api.c b/src/namestore/namestore_api.c index 3df6f8210..c4282ec71 100644 --- a/src/namestore/namestore_api.c +++ b/src/namestore/namestore_api.c | |||
@@ -134,7 +134,7 @@ struct GNUNET_NAMESTORE_ZoneIterator | |||
134 | /** | 134 | /** |
135 | * Private key of the zone. | 135 | * Private key of the zone. |
136 | */ | 136 | */ |
137 | struct GNUNET_CRYPTO_EccPrivateKey zone; | 137 | struct GNUNET_CRYPTO_EcdsaPrivateKey zone; |
138 | 138 | ||
139 | /** | 139 | /** |
140 | * The operation id this zone iteration operation has | 140 | * The operation id this zone iteration operation has |
@@ -592,7 +592,7 @@ handle_zone_iteration_response (struct GNUNET_NAMESTORE_ZoneIterator *ze, | |||
592 | const struct RecordResultMessage *msg, | 592 | const struct RecordResultMessage *msg, |
593 | size_t size) | 593 | size_t size) |
594 | { | 594 | { |
595 | static struct GNUNET_CRYPTO_EccPrivateKey priv_dummy; | 595 | static struct GNUNET_CRYPTO_EcdsaPrivateKey priv_dummy; |
596 | size_t msg_len; | 596 | size_t msg_len; |
597 | size_t exp_msg_len; | 597 | size_t exp_msg_len; |
598 | size_t name_len; | 598 | size_t name_len; |
@@ -1082,7 +1082,7 @@ GNUNET_NAMESTORE_block_cache (struct GNUNET_NAMESTORE_Handle *h, | |||
1082 | */ | 1082 | */ |
1083 | struct GNUNET_NAMESTORE_QueueEntry * | 1083 | struct GNUNET_NAMESTORE_QueueEntry * |
1084 | GNUNET_NAMESTORE_records_store (struct GNUNET_NAMESTORE_Handle *h, | 1084 | GNUNET_NAMESTORE_records_store (struct GNUNET_NAMESTORE_Handle *h, |
1085 | const struct GNUNET_CRYPTO_EccPrivateKey *pkey, | 1085 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *pkey, |
1086 | const char *label, | 1086 | const char *label, |
1087 | unsigned int rd_count, | 1087 | unsigned int rd_count, |
1088 | const struct GNUNET_NAMESTORE_RecordData *rd, | 1088 | const struct GNUNET_NAMESTORE_RecordData *rd, |
@@ -1212,8 +1212,8 @@ GNUNET_NAMESTORE_lookup_block (struct GNUNET_NAMESTORE_Handle *h, | |||
1212 | */ | 1212 | */ |
1213 | struct GNUNET_NAMESTORE_QueueEntry * | 1213 | struct GNUNET_NAMESTORE_QueueEntry * |
1214 | GNUNET_NAMESTORE_zone_to_name (struct GNUNET_NAMESTORE_Handle *h, | 1214 | GNUNET_NAMESTORE_zone_to_name (struct GNUNET_NAMESTORE_Handle *h, |
1215 | const struct GNUNET_CRYPTO_EccPrivateKey *zone, | 1215 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone, |
1216 | const struct GNUNET_CRYPTO_EccPublicSignKey *value_zone, | 1216 | const struct GNUNET_CRYPTO_EcdsaPublicKey *value_zone, |
1217 | GNUNET_NAMESTORE_RecordMonitor proc, void *proc_cls) | 1217 | GNUNET_NAMESTORE_RecordMonitor proc, void *proc_cls) |
1218 | { | 1218 | { |
1219 | struct GNUNET_NAMESTORE_QueueEntry *qe; | 1219 | struct GNUNET_NAMESTORE_QueueEntry *qe; |
@@ -1268,7 +1268,7 @@ GNUNET_NAMESTORE_zone_to_name (struct GNUNET_NAMESTORE_Handle *h, | |||
1268 | */ | 1268 | */ |
1269 | struct GNUNET_NAMESTORE_ZoneIterator * | 1269 | struct GNUNET_NAMESTORE_ZoneIterator * |
1270 | GNUNET_NAMESTORE_zone_iteration_start (struct GNUNET_NAMESTORE_Handle *h, | 1270 | GNUNET_NAMESTORE_zone_iteration_start (struct GNUNET_NAMESTORE_Handle *h, |
1271 | const struct GNUNET_CRYPTO_EccPrivateKey *zone, | 1271 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone, |
1272 | GNUNET_NAMESTORE_RecordMonitor proc, | 1272 | GNUNET_NAMESTORE_RecordMonitor proc, |
1273 | void *proc_cls) | 1273 | void *proc_cls) |
1274 | { | 1274 | { |
diff --git a/src/namestore/namestore_api_common.c b/src/namestore/namestore_api_common.c index 8cf75330c..81662a861 100644 --- a/src/namestore/namestore_api_common.c +++ b/src/namestore/namestore_api_common.c | |||
@@ -98,13 +98,13 @@ GNUNET_NAMESTORE_normalize_string (const char *src) | |||
98 | * @return string form; will be overwritten by next call to #GNUNET_NAMESTORE_z2s | 98 | * @return string form; will be overwritten by next call to #GNUNET_NAMESTORE_z2s |
99 | */ | 99 | */ |
100 | const char * | 100 | const char * |
101 | GNUNET_NAMESTORE_z2s (const struct GNUNET_CRYPTO_EccPublicSignKey *z) | 101 | GNUNET_NAMESTORE_z2s (const struct GNUNET_CRYPTO_EcdsaPublicKey *z) |
102 | { | 102 | { |
103 | static char buf[sizeof (struct GNUNET_CRYPTO_EccPublicSignKey) * 8]; | 103 | static char buf[sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey) * 8]; |
104 | char *end; | 104 | char *end; |
105 | 105 | ||
106 | end = GNUNET_STRINGS_data_to_string ((const unsigned char *) z, | 106 | end = GNUNET_STRINGS_data_to_string ((const unsigned char *) z, |
107 | sizeof (struct GNUNET_CRYPTO_EccPublicSignKey), | 107 | sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey), |
108 | buf, sizeof (buf)); | 108 | buf, sizeof (buf)); |
109 | if (NULL == end) | 109 | if (NULL == end) |
110 | { | 110 | { |
@@ -342,18 +342,18 @@ static void | |||
342 | derive_block_aes_key (struct GNUNET_CRYPTO_SymmetricInitializationVector *iv, | 342 | derive_block_aes_key (struct GNUNET_CRYPTO_SymmetricInitializationVector *iv, |
343 | struct GNUNET_CRYPTO_SymmetricSessionKey *skey, | 343 | struct GNUNET_CRYPTO_SymmetricSessionKey *skey, |
344 | const char *label, | 344 | const char *label, |
345 | const struct GNUNET_CRYPTO_EccPublicSignKey *pub) | 345 | const struct GNUNET_CRYPTO_EcdsaPublicKey *pub) |
346 | { | 346 | { |
347 | static const char ctx_key[] = "gns-aes-ctx-key"; | 347 | static const char ctx_key[] = "gns-aes-ctx-key"; |
348 | static const char ctx_iv[] = "gns-aes-ctx-iv"; | 348 | static const char ctx_iv[] = "gns-aes-ctx-iv"; |
349 | 349 | ||
350 | GNUNET_CRYPTO_kdf (skey, sizeof (struct GNUNET_CRYPTO_SymmetricSessionKey), | 350 | GNUNET_CRYPTO_kdf (skey, sizeof (struct GNUNET_CRYPTO_SymmetricSessionKey), |
351 | pub, sizeof (struct GNUNET_CRYPTO_EccPublicSignKey), | 351 | pub, sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey), |
352 | label, strlen (label), | 352 | label, strlen (label), |
353 | ctx_key, strlen (ctx_key), | 353 | ctx_key, strlen (ctx_key), |
354 | NULL, 0); | 354 | NULL, 0); |
355 | GNUNET_CRYPTO_kdf (iv, sizeof (struct GNUNET_CRYPTO_SymmetricInitializationVector), | 355 | GNUNET_CRYPTO_kdf (iv, sizeof (struct GNUNET_CRYPTO_SymmetricInitializationVector), |
356 | pub, sizeof (struct GNUNET_CRYPTO_EccPublicSignKey), | 356 | pub, sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey), |
357 | label, strlen (label), | 357 | label, strlen (label), |
358 | ctx_iv, strlen (ctx_iv), | 358 | ctx_iv, strlen (ctx_iv), |
359 | NULL, 0); | 359 | NULL, 0); |
@@ -371,7 +371,7 @@ derive_block_aes_key (struct GNUNET_CRYPTO_SymmetricInitializationVector *iv, | |||
371 | * @return NULL on error (block too large) | 371 | * @return NULL on error (block too large) |
372 | */ | 372 | */ |
373 | struct GNUNET_NAMESTORE_Block * | 373 | struct GNUNET_NAMESTORE_Block * |
374 | GNUNET_NAMESTORE_block_create (const struct GNUNET_CRYPTO_EccPrivateKey *key, | 374 | GNUNET_NAMESTORE_block_create (const struct GNUNET_CRYPTO_EcdsaPrivateKey *key, |
375 | struct GNUNET_TIME_Absolute expire, | 375 | struct GNUNET_TIME_Absolute expire, |
376 | const char *label, | 376 | const char *label, |
377 | const struct GNUNET_NAMESTORE_RecordData *rd, | 377 | const struct GNUNET_NAMESTORE_RecordData *rd, |
@@ -380,8 +380,8 @@ GNUNET_NAMESTORE_block_create (const struct GNUNET_CRYPTO_EccPrivateKey *key, | |||
380 | size_t payload_len = GNUNET_NAMESTORE_records_get_size (rd_count, rd); | 380 | size_t payload_len = GNUNET_NAMESTORE_records_get_size (rd_count, rd); |
381 | char payload[sizeof (uint32_t) + payload_len]; | 381 | char payload[sizeof (uint32_t) + payload_len]; |
382 | struct GNUNET_NAMESTORE_Block *block; | 382 | struct GNUNET_NAMESTORE_Block *block; |
383 | struct GNUNET_CRYPTO_EccPublicSignKey pkey; | 383 | struct GNUNET_CRYPTO_EcdsaPublicKey pkey; |
384 | struct GNUNET_CRYPTO_EccPrivateKey *dkey; | 384 | struct GNUNET_CRYPTO_EcdsaPrivateKey *dkey; |
385 | struct GNUNET_CRYPTO_SymmetricInitializationVector iv; | 385 | struct GNUNET_CRYPTO_SymmetricInitializationVector iv; |
386 | struct GNUNET_CRYPTO_SymmetricSessionKey skey; | 386 | struct GNUNET_CRYPTO_SymmetricSessionKey skey; |
387 | uint32_t rd_count_nbo; | 387 | uint32_t rd_count_nbo; |
@@ -400,12 +400,12 @@ GNUNET_NAMESTORE_block_create (const struct GNUNET_CRYPTO_EccPrivateKey *key, | |||
400 | sizeof (struct GNUNET_TIME_AbsoluteNBO)); | 400 | sizeof (struct GNUNET_TIME_AbsoluteNBO)); |
401 | block->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_GNS_RECORD_SIGN); | 401 | block->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_GNS_RECORD_SIGN); |
402 | block->expiration_time = GNUNET_TIME_absolute_hton (expire); | 402 | block->expiration_time = GNUNET_TIME_absolute_hton (expire); |
403 | dkey = GNUNET_CRYPTO_ecc_key_derive (key, | 403 | dkey = GNUNET_CRYPTO_ecdsa_private_key_derive (key, |
404 | label, | 404 | label, |
405 | "gns"); | 405 | "gns"); |
406 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (dkey, | 406 | GNUNET_CRYPTO_ecdsa_key_get_public (dkey, |
407 | &block->derived_key); | 407 | &block->derived_key); |
408 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (key, | 408 | GNUNET_CRYPTO_ecdsa_key_get_public (key, |
409 | &pkey); | 409 | &pkey); |
410 | derive_block_aes_key (&iv, &skey, label, &pkey); | 410 | derive_block_aes_key (&iv, &skey, label, &pkey); |
411 | GNUNET_break (payload_len + sizeof (uint32_t) == | 411 | GNUNET_break (payload_len + sizeof (uint32_t) == |
@@ -413,7 +413,7 @@ GNUNET_NAMESTORE_block_create (const struct GNUNET_CRYPTO_EccPrivateKey *key, | |||
413 | &skey, &iv, | 413 | &skey, &iv, |
414 | &block[1])); | 414 | &block[1])); |
415 | if (GNUNET_OK != | 415 | if (GNUNET_OK != |
416 | GNUNET_CRYPTO_ecc_sign (dkey, | 416 | GNUNET_CRYPTO_ecdsa_sign (dkey, |
417 | &block->purpose, | 417 | &block->purpose, |
418 | &block->signature)) | 418 | &block->signature)) |
419 | { | 419 | { |
@@ -437,7 +437,7 @@ GNUNET_NAMESTORE_block_create (const struct GNUNET_CRYPTO_EccPrivateKey *key, | |||
437 | int | 437 | int |
438 | GNUNET_NAMESTORE_block_verify (const struct GNUNET_NAMESTORE_Block *block) | 438 | GNUNET_NAMESTORE_block_verify (const struct GNUNET_NAMESTORE_Block *block) |
439 | { | 439 | { |
440 | return GNUNET_CRYPTO_ecc_verify (GNUNET_SIGNATURE_PURPOSE_GNS_RECORD_SIGN, | 440 | return GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_GNS_RECORD_SIGN, |
441 | &block->purpose, | 441 | &block->purpose, |
442 | &block->signature, | 442 | &block->signature, |
443 | &block->derived_key); | 443 | &block->derived_key); |
@@ -457,7 +457,7 @@ GNUNET_NAMESTORE_block_verify (const struct GNUNET_NAMESTORE_Block *block) | |||
457 | */ | 457 | */ |
458 | int | 458 | int |
459 | GNUNET_NAMESTORE_block_decrypt (const struct GNUNET_NAMESTORE_Block *block, | 459 | GNUNET_NAMESTORE_block_decrypt (const struct GNUNET_NAMESTORE_Block *block, |
460 | const struct GNUNET_CRYPTO_EccPublicSignKey *zone_key, | 460 | const struct GNUNET_CRYPTO_EcdsaPublicKey *zone_key, |
461 | const char *label, | 461 | const char *label, |
462 | GNUNET_NAMESTORE_RecordCallback proc, | 462 | GNUNET_NAMESTORE_RecordCallback proc, |
463 | void *proc_cls) | 463 | void *proc_cls) |
@@ -653,9 +653,9 @@ GNUNET_NAMESTORE_value_to_string (uint32_t type, | |||
653 | return NULL; | 653 | return NULL; |
654 | return GNUNET_strdup (tmp); | 654 | return GNUNET_strdup (tmp); |
655 | case GNUNET_NAMESTORE_TYPE_PKEY: | 655 | case GNUNET_NAMESTORE_TYPE_PKEY: |
656 | if (data_size != sizeof (struct GNUNET_CRYPTO_EccPublicSignKey)) | 656 | if (data_size != sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey)) |
657 | return NULL; | 657 | return NULL; |
658 | return GNUNET_CRYPTO_ecc_public_sign_key_to_string (data); | 658 | return GNUNET_CRYPTO_ecdsa_public_key_to_string (data); |
659 | case GNUNET_NAMESTORE_TYPE_PHONE: | 659 | case GNUNET_NAMESTORE_TYPE_PHONE: |
660 | { | 660 | { |
661 | const struct GNUNET_CONVERSATION_PhoneRecord *pr; | 661 | const struct GNUNET_CONVERSATION_PhoneRecord *pr; |
@@ -667,7 +667,7 @@ GNUNET_NAMESTORE_value_to_string (uint32_t type, | |||
667 | pr = data; | 667 | pr = data; |
668 | if (0 != ntohl (pr->version)) | 668 | if (0 != ntohl (pr->version)) |
669 | return NULL; | 669 | return NULL; |
670 | pkey = GNUNET_CRYPTO_ecc_public_sign_key_to_string (&pr->peer.public_key); | 670 | pkey = GNUNET_CRYPTO_eddsa_public_key_to_string (&pr->peer.public_key); |
671 | GNUNET_asprintf (&ret, | 671 | GNUNET_asprintf (&ret, |
672 | "%u-%s", | 672 | "%u-%s", |
673 | ntohl (pr->line), | 673 | ntohl (pr->line), |
@@ -792,7 +792,7 @@ GNUNET_NAMESTORE_string_to_value (uint32_t type, | |||
792 | { | 792 | { |
793 | struct in_addr value_a; | 793 | struct in_addr value_a; |
794 | struct in6_addr value_aaaa; | 794 | struct in6_addr value_aaaa; |
795 | struct GNUNET_CRYPTO_EccPublicSignKey pkey; | 795 | struct GNUNET_CRYPTO_EcdsaPublicKey pkey; |
796 | struct GNUNET_TUN_GnsVpnRecord *vpn; | 796 | struct GNUNET_TUN_GnsVpnRecord *vpn; |
797 | struct GNUNET_TUN_DnsTlsaRecord *tlsa; | 797 | struct GNUNET_TUN_DnsTlsaRecord *tlsa; |
798 | char s_peer[103 + 1]; | 798 | char s_peer[103 + 1]; |
@@ -987,16 +987,16 @@ GNUNET_NAMESTORE_string_to_value (uint32_t type, | |||
987 | return GNUNET_OK; | 987 | return GNUNET_OK; |
988 | case GNUNET_NAMESTORE_TYPE_PKEY: | 988 | case GNUNET_NAMESTORE_TYPE_PKEY: |
989 | if (GNUNET_OK != | 989 | if (GNUNET_OK != |
990 | GNUNET_CRYPTO_ecc_public_sign_key_from_string (s, strlen (s), &pkey)) | 990 | GNUNET_CRYPTO_ecdsa_public_key_from_string (s, strlen (s), &pkey)) |
991 | { | 991 | { |
992 | LOG (GNUNET_ERROR_TYPE_ERROR, | 992 | LOG (GNUNET_ERROR_TYPE_ERROR, |
993 | _("Unable to parse PKEY record `%s'\n"), | 993 | _("Unable to parse PKEY record `%s'\n"), |
994 | s); | 994 | s); |
995 | return GNUNET_SYSERR; | 995 | return GNUNET_SYSERR; |
996 | } | 996 | } |
997 | *data = GNUNET_new (struct GNUNET_CRYPTO_EccPublicSignKey); | 997 | *data = GNUNET_new (struct GNUNET_CRYPTO_EcdsaPublicKey); |
998 | memcpy (*data, &pkey, sizeof (pkey)); | 998 | memcpy (*data, &pkey, sizeof (pkey)); |
999 | *data_size = sizeof (struct GNUNET_CRYPTO_EccPublicSignKey); | 999 | *data_size = sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey); |
1000 | return GNUNET_OK; | 1000 | return GNUNET_OK; |
1001 | case GNUNET_NAMESTORE_TYPE_PHONE: | 1001 | case GNUNET_NAMESTORE_TYPE_PHONE: |
1002 | { | 1002 | { |
@@ -1008,7 +1008,7 @@ GNUNET_NAMESTORE_string_to_value (uint32_t type, | |||
1008 | if ( (NULL == (dash = strchr (s, '-'))) || | 1008 | if ( (NULL == (dash = strchr (s, '-'))) || |
1009 | (1 != sscanf (s, "%u-", &line)) || | 1009 | (1 != sscanf (s, "%u-", &line)) || |
1010 | (GNUNET_OK != | 1010 | (GNUNET_OK != |
1011 | GNUNET_CRYPTO_ecc_public_sign_key_from_string (dash + 1, | 1011 | GNUNET_CRYPTO_eddsa_public_key_from_string (dash + 1, |
1012 | strlen (dash + 1), | 1012 | strlen (dash + 1), |
1013 | &peer.public_key)) ) | 1013 | &peer.public_key)) ) |
1014 | { | 1014 | { |
@@ -1044,7 +1044,7 @@ GNUNET_NAMESTORE_string_to_value (uint32_t type, | |||
1044 | } | 1044 | } |
1045 | *data_size = sizeof (struct GNUNET_TUN_GnsVpnRecord) + strlen (s_serv) + 1; | 1045 | *data_size = sizeof (struct GNUNET_TUN_GnsVpnRecord) + strlen (s_serv) + 1; |
1046 | *data = vpn = GNUNET_malloc (*data_size); | 1046 | *data = vpn = GNUNET_malloc (*data_size); |
1047 | if (GNUNET_OK != GNUNET_CRYPTO_ecc_public_sign_key_from_string ((char*) s_peer, | 1047 | if (GNUNET_OK != GNUNET_CRYPTO_eddsa_public_key_from_string ((char*) s_peer, |
1048 | strlen (s_peer), | 1048 | strlen (s_peer), |
1049 | &vpn->peer.public_key)) | 1049 | &vpn->peer.public_key)) |
1050 | { | 1050 | { |
@@ -1194,13 +1194,13 @@ GNUNET_NAMESTORE_is_expired (const struct GNUNET_NAMESTORE_RecordData *rd) | |||
1194 | * @param query hash to use for the query | 1194 | * @param query hash to use for the query |
1195 | */ | 1195 | */ |
1196 | void | 1196 | void |
1197 | GNUNET_NAMESTORE_query_from_private_key (const struct GNUNET_CRYPTO_EccPrivateKey *zone, | 1197 | GNUNET_NAMESTORE_query_from_private_key (const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone, |
1198 | const char *label, | 1198 | const char *label, |
1199 | struct GNUNET_HashCode *query) | 1199 | struct GNUNET_HashCode *query) |
1200 | { | 1200 | { |
1201 | struct GNUNET_CRYPTO_EccPublicSignKey pub; | 1201 | struct GNUNET_CRYPTO_EcdsaPublicKey pub; |
1202 | 1202 | ||
1203 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (zone, &pub); | 1203 | GNUNET_CRYPTO_ecdsa_key_get_public (zone, &pub); |
1204 | GNUNET_NAMESTORE_query_from_public_key (&pub, label, query); | 1204 | GNUNET_NAMESTORE_query_from_public_key (&pub, label, query); |
1205 | } | 1205 | } |
1206 | 1206 | ||
@@ -1213,13 +1213,13 @@ GNUNET_NAMESTORE_query_from_private_key (const struct GNUNET_CRYPTO_EccPrivateKe | |||
1213 | * @param query hash to use for the query | 1213 | * @param query hash to use for the query |
1214 | */ | 1214 | */ |
1215 | void | 1215 | void |
1216 | GNUNET_NAMESTORE_query_from_public_key (const struct GNUNET_CRYPTO_EccPublicSignKey *pub, | 1216 | GNUNET_NAMESTORE_query_from_public_key (const struct GNUNET_CRYPTO_EcdsaPublicKey *pub, |
1217 | const char *label, | 1217 | const char *label, |
1218 | struct GNUNET_HashCode *query) | 1218 | struct GNUNET_HashCode *query) |
1219 | { | 1219 | { |
1220 | struct GNUNET_CRYPTO_EccPublicSignKey pd; | 1220 | struct GNUNET_CRYPTO_EcdsaPublicKey pd; |
1221 | 1221 | ||
1222 | GNUNET_CRYPTO_ecc_public_key_derive (pub, label, "gns", &pd); | 1222 | GNUNET_CRYPTO_ecdsa_public_key_derive (pub, label, "gns", &pd); |
1223 | GNUNET_CRYPTO_hash (&pd, sizeof (pd), query); | 1223 | GNUNET_CRYPTO_hash (&pd, sizeof (pd), query); |
1224 | } | 1224 | } |
1225 | 1225 | ||
@@ -1235,12 +1235,12 @@ GNUNET_NAMESTORE_query_from_public_key (const struct GNUNET_CRYPTO_EccPublicSign | |||
1235 | * key in an encoding suitable for DNS labels. | 1235 | * key in an encoding suitable for DNS labels. |
1236 | */ | 1236 | */ |
1237 | const char * | 1237 | const char * |
1238 | GNUNET_NAMESTORE_pkey_to_zkey (const struct GNUNET_CRYPTO_EccPublicSignKey *pkey) | 1238 | GNUNET_NAMESTORE_pkey_to_zkey (const struct GNUNET_CRYPTO_EcdsaPublicKey *pkey) |
1239 | { | 1239 | { |
1240 | static char ret[128]; | 1240 | static char ret[128]; |
1241 | char *pkeys; | 1241 | char *pkeys; |
1242 | 1242 | ||
1243 | pkeys = GNUNET_CRYPTO_ecc_public_sign_key_to_string (pkey); | 1243 | pkeys = GNUNET_CRYPTO_ecdsa_public_key_to_string (pkey); |
1244 | GNUNET_snprintf (ret, | 1244 | GNUNET_snprintf (ret, |
1245 | sizeof (ret), | 1245 | sizeof (ret), |
1246 | "%s.zkey", | 1246 | "%s.zkey", |
@@ -1261,7 +1261,7 @@ GNUNET_NAMESTORE_pkey_to_zkey (const struct GNUNET_CRYPTO_EccPublicSignKey *pkey | |||
1261 | */ | 1261 | */ |
1262 | int | 1262 | int |
1263 | GNUNET_NAMESTORE_zkey_to_pkey (const char *zkey, | 1263 | GNUNET_NAMESTORE_zkey_to_pkey (const char *zkey, |
1264 | struct GNUNET_CRYPTO_EccPublicSignKey *pkey) | 1264 | struct GNUNET_CRYPTO_EcdsaPublicKey *pkey) |
1265 | { | 1265 | { |
1266 | char *cpy; | 1266 | char *cpy; |
1267 | char *dot; | 1267 | char *dot; |
@@ -1277,7 +1277,7 @@ GNUNET_NAMESTORE_zkey_to_pkey (const char *zkey, | |||
1277 | goto error; | 1277 | goto error; |
1278 | 1278 | ||
1279 | if (GNUNET_OK != | 1279 | if (GNUNET_OK != |
1280 | GNUNET_CRYPTO_ecc_public_sign_key_from_string (x, | 1280 | GNUNET_CRYPTO_ecdsa_public_key_from_string (x, |
1281 | strlen (x), | 1281 | strlen (x), |
1282 | pkey)) | 1282 | pkey)) |
1283 | goto error; | 1283 | goto error; |
diff --git a/src/namestore/namestore_api_monitor.c b/src/namestore/namestore_api_monitor.c index ccf556abd..c9834e46c 100644 --- a/src/namestore/namestore_api_monitor.c +++ b/src/namestore/namestore_api_monitor.c | |||
@@ -73,7 +73,7 @@ struct GNUNET_NAMESTORE_ZoneMonitor | |||
73 | /** | 73 | /** |
74 | * Monitored zone. | 74 | * Monitored zone. |
75 | */ | 75 | */ |
76 | struct GNUNET_CRYPTO_EccPrivateKey zone; | 76 | struct GNUNET_CRYPTO_EcdsaPrivateKey zone; |
77 | 77 | ||
78 | }; | 78 | }; |
79 | 79 | ||
@@ -255,7 +255,7 @@ transmit_monitor_message (void *cls, | |||
255 | */ | 255 | */ |
256 | struct GNUNET_NAMESTORE_ZoneMonitor * | 256 | struct GNUNET_NAMESTORE_ZoneMonitor * |
257 | GNUNET_NAMESTORE_zone_monitor_start (const struct GNUNET_CONFIGURATION_Handle *cfg, | 257 | GNUNET_NAMESTORE_zone_monitor_start (const struct GNUNET_CONFIGURATION_Handle *cfg, |
258 | const struct GNUNET_CRYPTO_EccPrivateKey *zone, | 258 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone, |
259 | GNUNET_NAMESTORE_RecordMonitor monitor, | 259 | GNUNET_NAMESTORE_RecordMonitor monitor, |
260 | GNUNET_NAMESTORE_RecordsSynchronizedCallback sync_cb, | 260 | GNUNET_NAMESTORE_RecordsSynchronizedCallback sync_cb, |
261 | void *cls) | 261 | void *cls) |
diff --git a/src/namestore/plugin_namestore_postgres.c b/src/namestore/plugin_namestore_postgres.c index 7be06b2f5..6a1dc6f2c 100644 --- a/src/namestore/plugin_namestore_postgres.c +++ b/src/namestore/plugin_namestore_postgres.c | |||
@@ -337,8 +337,8 @@ namestore_postgres_cache_block (void *cls, | |||
337 | struct Plugin *plugin = cls; | 337 | struct Plugin *plugin = cls; |
338 | struct GNUNET_HashCode query; | 338 | struct GNUNET_HashCode query; |
339 | size_t block_size = ntohl (block->purpose.size) + | 339 | size_t block_size = ntohl (block->purpose.size) + |
340 | sizeof (struct GNUNET_CRYPTO_EccPublicSignKey) + | 340 | sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey) + |
341 | sizeof (struct GNUNET_CRYPTO_EccSignature); | 341 | sizeof (struct GNUNET_CRYPTO_EcdsaSignature); |
342 | const char *paramValues[] = { | 342 | const char *paramValues[] = { |
343 | (const char *) &query, | 343 | (const char *) &query, |
344 | (const char *) block, | 344 | (const char *) block, |
@@ -354,7 +354,7 @@ namestore_postgres_cache_block (void *cls, | |||
354 | 354 | ||
355 | namestore_postgres_expire_blocks (plugin); | 355 | namestore_postgres_expire_blocks (plugin); |
356 | GNUNET_CRYPTO_hash (&block->derived_key, | 356 | GNUNET_CRYPTO_hash (&block->derived_key, |
357 | sizeof (struct GNUNET_CRYPTO_EccPublicSignKey), | 357 | sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey), |
358 | &query); | 358 | &query); |
359 | if (block_size > 64 * 65536) | 359 | if (block_size > 64 * 65536) |
360 | { | 360 | { |
@@ -433,8 +433,8 @@ namestore_postgres_lookup_block (void *cls, | |||
433 | block = (const struct GNUNET_NAMESTORE_Block *) PQgetvalue (res, 0, 0); | 433 | block = (const struct GNUNET_NAMESTORE_Block *) PQgetvalue (res, 0, 0); |
434 | if ( (bsize < sizeof (*block)) || | 434 | if ( (bsize < sizeof (*block)) || |
435 | (bsize != ntohl (block->purpose.size) + | 435 | (bsize != ntohl (block->purpose.size) + |
436 | sizeof (struct GNUNET_CRYPTO_EccPublicSignKey) + | 436 | sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey) + |
437 | sizeof (struct GNUNET_CRYPTO_EccSignature)) ) | 437 | sizeof (struct GNUNET_CRYPTO_EcdsaSignature)) ) |
438 | { | 438 | { |
439 | GNUNET_break (0); | 439 | GNUNET_break (0); |
440 | LOG (GNUNET_ERROR_TYPE_DEBUG, | 440 | LOG (GNUNET_ERROR_TYPE_DEBUG, |
@@ -461,13 +461,13 @@ namestore_postgres_lookup_block (void *cls, | |||
461 | */ | 461 | */ |
462 | static int | 462 | static int |
463 | namestore_postgres_store_records (void *cls, | 463 | namestore_postgres_store_records (void *cls, |
464 | const struct GNUNET_CRYPTO_EccPrivateKey *zone_key, | 464 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key, |
465 | const char *label, | 465 | const char *label, |
466 | unsigned int rd_count, | 466 | unsigned int rd_count, |
467 | const struct GNUNET_NAMESTORE_RecordData *rd) | 467 | const struct GNUNET_NAMESTORE_RecordData *rd) |
468 | { | 468 | { |
469 | struct Plugin *plugin = cls; | 469 | struct Plugin *plugin = cls; |
470 | struct GNUNET_CRYPTO_EccPublicSignKey pkey; | 470 | struct GNUNET_CRYPTO_EcdsaPublicKey pkey; |
471 | uint64_t rvalue; | 471 | uint64_t rvalue; |
472 | uint32_t rd_count_nbo = htonl ((uint32_t) rd_count); | 472 | uint32_t rd_count_nbo = htonl ((uint32_t) rd_count); |
473 | size_t data_size; | 473 | size_t data_size; |
@@ -477,7 +477,7 @@ namestore_postgres_store_records (void *cls, | |||
477 | for (i=0;i<rd_count;i++) | 477 | for (i=0;i<rd_count;i++) |
478 | if (GNUNET_NAMESTORE_TYPE_PKEY == rd[i].record_type) | 478 | if (GNUNET_NAMESTORE_TYPE_PKEY == rd[i].record_type) |
479 | { | 479 | { |
480 | GNUNET_break (sizeof (struct GNUNET_CRYPTO_EccPublicSignKey) == rd[i].data_size); | 480 | GNUNET_break (sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey) == rd[i].data_size); |
481 | memcpy (&pkey, | 481 | memcpy (&pkey, |
482 | rd[i].data, | 482 | rd[i].data, |
483 | rd[i].data_size); | 483 | rd[i].data_size); |
@@ -549,7 +549,7 @@ namestore_postgres_store_records (void *cls, | |||
549 | static int | 549 | static int |
550 | get_record_and_call_iterator (struct Plugin *plugin, | 550 | get_record_and_call_iterator (struct Plugin *plugin, |
551 | PGresult *res, | 551 | PGresult *res, |
552 | const struct GNUNET_CRYPTO_EccPrivateKey *zone_key, | 552 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key, |
553 | GNUNET_NAMESTORE_RecordIterator iter, void *iter_cls) | 553 | GNUNET_NAMESTORE_RecordIterator iter, void *iter_cls) |
554 | { | 554 | { |
555 | const char *data; | 555 | const char *data; |
@@ -580,13 +580,13 @@ get_record_and_call_iterator (struct Plugin *plugin, | |||
580 | GNUNET_assert (3 + ((NULL == zone_key) ? 1 : 0) == PQnfields (res)); | 580 | GNUNET_assert (3 + ((NULL == zone_key) ? 1 : 0) == PQnfields (res)); |
581 | if (NULL == zone_key) | 581 | if (NULL == zone_key) |
582 | { | 582 | { |
583 | if (sizeof (struct GNUNET_CRYPTO_EccPrivateKey) != PQgetlength (res, 0, 3)) | 583 | if (sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey) != PQgetlength (res, 0, 3)) |
584 | { | 584 | { |
585 | GNUNET_break (0); | 585 | GNUNET_break (0); |
586 | PQclear (res); | 586 | PQclear (res); |
587 | return GNUNET_SYSERR; | 587 | return GNUNET_SYSERR; |
588 | } | 588 | } |
589 | zone_key = (const struct GNUNET_CRYPTO_EccPrivateKey *) PQgetvalue (res, 0, 3); | 589 | zone_key = (const struct GNUNET_CRYPTO_EcdsaPrivateKey *) PQgetvalue (res, 0, 3); |
590 | } | 590 | } |
591 | if (sizeof (uint32_t) != PQfsize (res, 0)) | 591 | if (sizeof (uint32_t) != PQfsize (res, 0)) |
592 | { | 592 | { |
@@ -642,7 +642,7 @@ get_record_and_call_iterator (struct Plugin *plugin, | |||
642 | */ | 642 | */ |
643 | static int | 643 | static int |
644 | namestore_postgres_iterate_records (void *cls, | 644 | namestore_postgres_iterate_records (void *cls, |
645 | const struct GNUNET_CRYPTO_EccPrivateKey *zone, | 645 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone, |
646 | uint64_t offset, | 646 | uint64_t offset, |
647 | GNUNET_NAMESTORE_RecordIterator iter, void *iter_cls) | 647 | GNUNET_NAMESTORE_RecordIterator iter, void *iter_cls) |
648 | { | 648 | { |
@@ -707,8 +707,8 @@ namestore_postgres_iterate_records (void *cls, | |||
707 | */ | 707 | */ |
708 | static int | 708 | static int |
709 | namestore_postgres_zone_to_name (void *cls, | 709 | namestore_postgres_zone_to_name (void *cls, |
710 | const struct GNUNET_CRYPTO_EccPrivateKey *zone, | 710 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone, |
711 | const struct GNUNET_CRYPTO_EccPublicSignKey *value_zone, | 711 | const struct GNUNET_CRYPTO_EcdsaPublicKey *value_zone, |
712 | GNUNET_NAMESTORE_RecordIterator iter, void *iter_cls) | 712 | GNUNET_NAMESTORE_RecordIterator iter, void *iter_cls) |
713 | { | 713 | { |
714 | struct Plugin *plugin = cls; | 714 | struct Plugin *plugin = cls; |
diff --git a/src/namestore/plugin_namestore_sqlite.c b/src/namestore/plugin_namestore_sqlite.c index 19fa86bf3..729b916ca 100644 --- a/src/namestore/plugin_namestore_sqlite.c +++ b/src/namestore/plugin_namestore_sqlite.c | |||
@@ -467,15 +467,15 @@ namestore_sqlite_cache_block (void *cls, | |||
467 | 467 | ||
468 | namestore_sqlite_expire_blocks (plugin); | 468 | namestore_sqlite_expire_blocks (plugin); |
469 | GNUNET_CRYPTO_hash (&block->derived_key, | 469 | GNUNET_CRYPTO_hash (&block->derived_key, |
470 | sizeof (struct GNUNET_CRYPTO_EccPublicSignKey), | 470 | sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey), |
471 | &query); | 471 | &query); |
472 | expiration = GNUNET_TIME_absolute_ntoh (block->expiration_time); | 472 | expiration = GNUNET_TIME_absolute_ntoh (block->expiration_time); |
473 | dval = (int64_t) expiration.abs_value_us; | 473 | dval = (int64_t) expiration.abs_value_us; |
474 | if (dval < 0) | 474 | if (dval < 0) |
475 | dval = INT64_MAX; | 475 | dval = INT64_MAX; |
476 | block_size = ntohl (block->purpose.size) + | 476 | block_size = ntohl (block->purpose.size) + |
477 | sizeof (struct GNUNET_CRYPTO_EccPublicSignKey) + | 477 | sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey) + |
478 | sizeof (struct GNUNET_CRYPTO_EccSignature); | 478 | sizeof (struct GNUNET_CRYPTO_EcdsaSignature); |
479 | if (block_size > 64 * 65536) | 479 | if (block_size > 64 * 65536) |
480 | { | 480 | { |
481 | GNUNET_break (0); | 481 | GNUNET_break (0); |
@@ -606,8 +606,8 @@ namestore_sqlite_lookup_block (void *cls, | |||
606 | block_size = sqlite3_column_bytes (plugin->lookup_block, 0); | 606 | block_size = sqlite3_column_bytes (plugin->lookup_block, 0); |
607 | if ( (block_size < sizeof (struct GNUNET_NAMESTORE_Block)) || | 607 | if ( (block_size < sizeof (struct GNUNET_NAMESTORE_Block)) || |
608 | (ntohl (block->purpose.size) + | 608 | (ntohl (block->purpose.size) + |
609 | sizeof (struct GNUNET_CRYPTO_EccPublicSignKey) + | 609 | sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey) + |
610 | sizeof (struct GNUNET_CRYPTO_EccSignature) != block_size) ) | 610 | sizeof (struct GNUNET_CRYPTO_EcdsaSignature) != block_size) ) |
611 | { | 611 | { |
612 | GNUNET_break (0); | 612 | GNUNET_break (0); |
613 | ret = GNUNET_SYSERR; | 613 | ret = GNUNET_SYSERR; |
@@ -656,14 +656,14 @@ namestore_sqlite_lookup_block (void *cls, | |||
656 | */ | 656 | */ |
657 | static int | 657 | static int |
658 | namestore_sqlite_store_records (void *cls, | 658 | namestore_sqlite_store_records (void *cls, |
659 | const struct GNUNET_CRYPTO_EccPrivateKey *zone_key, | 659 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key, |
660 | const char *label, | 660 | const char *label, |
661 | unsigned int rd_count, | 661 | unsigned int rd_count, |
662 | const struct GNUNET_NAMESTORE_RecordData *rd) | 662 | const struct GNUNET_NAMESTORE_RecordData *rd) |
663 | { | 663 | { |
664 | struct Plugin *plugin = cls; | 664 | struct Plugin *plugin = cls; |
665 | int n; | 665 | int n; |
666 | struct GNUNET_CRYPTO_EccPublicSignKey pkey; | 666 | struct GNUNET_CRYPTO_EcdsaPublicKey pkey; |
667 | uint64_t rvalue; | 667 | uint64_t rvalue; |
668 | size_t data_size; | 668 | size_t data_size; |
669 | unsigned int i; | 669 | unsigned int i; |
@@ -672,7 +672,7 @@ namestore_sqlite_store_records (void *cls, | |||
672 | for (i=0;i<rd_count;i++) | 672 | for (i=0;i<rd_count;i++) |
673 | if (GNUNET_NAMESTORE_TYPE_PKEY == rd[i].record_type) | 673 | if (GNUNET_NAMESTORE_TYPE_PKEY == rd[i].record_type) |
674 | { | 674 | { |
675 | GNUNET_break (sizeof (struct GNUNET_CRYPTO_EccPublicSignKey) == rd[i].data_size); | 675 | GNUNET_break (sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey) == rd[i].data_size); |
676 | memcpy (&pkey, | 676 | memcpy (&pkey, |
677 | rd[i].data, | 677 | rd[i].data, |
678 | rd[i].data_size); | 678 | rd[i].data_size); |
@@ -697,7 +697,7 @@ namestore_sqlite_store_records (void *cls, | |||
697 | 697 | ||
698 | /* First delete 'old' records */ | 698 | /* First delete 'old' records */ |
699 | if ((SQLITE_OK != sqlite3_bind_blob (plugin->delete_records, 1, | 699 | if ((SQLITE_OK != sqlite3_bind_blob (plugin->delete_records, 1, |
700 | zone_key, sizeof (struct GNUNET_CRYPTO_EccPrivateKey), SQLITE_STATIC)) || | 700 | zone_key, sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey), SQLITE_STATIC)) || |
701 | (SQLITE_OK != sqlite3_bind_text (plugin->delete_records, 2, label, -1, SQLITE_STATIC))) | 701 | (SQLITE_OK != sqlite3_bind_text (plugin->delete_records, 2, label, -1, SQLITE_STATIC))) |
702 | { | 702 | { |
703 | LOG_SQLITE (plugin, | 703 | LOG_SQLITE (plugin, |
@@ -718,9 +718,9 @@ namestore_sqlite_store_records (void *cls, | |||
718 | if (0 != rd_count) | 718 | if (0 != rd_count) |
719 | { | 719 | { |
720 | if ((SQLITE_OK != sqlite3_bind_blob (plugin->store_records, 1, | 720 | if ((SQLITE_OK != sqlite3_bind_blob (plugin->store_records, 1, |
721 | zone_key, sizeof (struct GNUNET_CRYPTO_EccPrivateKey), SQLITE_STATIC)) || | 721 | zone_key, sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey), SQLITE_STATIC)) || |
722 | (SQLITE_OK != sqlite3_bind_blob (plugin->store_records, 2, | 722 | (SQLITE_OK != sqlite3_bind_blob (plugin->store_records, 2, |
723 | &pkey, sizeof (struct GNUNET_CRYPTO_EccPublicSignKey), SQLITE_STATIC)) || | 723 | &pkey, sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey), SQLITE_STATIC)) || |
724 | (SQLITE_OK != sqlite3_bind_int64 (plugin->store_records, 3, rvalue)) || | 724 | (SQLITE_OK != sqlite3_bind_int64 (plugin->store_records, 3, rvalue)) || |
725 | (SQLITE_OK != sqlite3_bind_int (plugin->store_records, 4, rd_count)) || | 725 | (SQLITE_OK != sqlite3_bind_int (plugin->store_records, 4, rd_count)) || |
726 | (SQLITE_OK != sqlite3_bind_blob (plugin->store_records, 5, data, data_size, SQLITE_STATIC)) || | 726 | (SQLITE_OK != sqlite3_bind_blob (plugin->store_records, 5, data, data_size, SQLITE_STATIC)) || |
@@ -776,7 +776,7 @@ namestore_sqlite_store_records (void *cls, | |||
776 | static int | 776 | static int |
777 | get_record_and_call_iterator (struct Plugin *plugin, | 777 | get_record_and_call_iterator (struct Plugin *plugin, |
778 | sqlite3_stmt *stmt, | 778 | sqlite3_stmt *stmt, |
779 | const struct GNUNET_CRYPTO_EccPrivateKey *zone_key, | 779 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key, |
780 | GNUNET_NAMESTORE_RecordIterator iter, void *iter_cls) | 780 | GNUNET_NAMESTORE_RecordIterator iter, void *iter_cls) |
781 | { | 781 | { |
782 | unsigned int record_count; | 782 | unsigned int record_count; |
@@ -796,7 +796,7 @@ get_record_and_call_iterator (struct Plugin *plugin, | |||
796 | if (NULL == zone_key) | 796 | if (NULL == zone_key) |
797 | { | 797 | { |
798 | /* must be "iterate_all_zones", got one extra return value */ | 798 | /* must be "iterate_all_zones", got one extra return value */ |
799 | if (sizeof (struct GNUNET_CRYPTO_EccPrivateKey) != | 799 | if (sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey) != |
800 | sqlite3_column_bytes (stmt, 3)) | 800 | sqlite3_column_bytes (stmt, 3)) |
801 | { | 801 | { |
802 | GNUNET_break (0); | 802 | GNUNET_break (0); |
@@ -859,7 +859,7 @@ get_record_and_call_iterator (struct Plugin *plugin, | |||
859 | */ | 859 | */ |
860 | static int | 860 | static int |
861 | namestore_sqlite_iterate_records (void *cls, | 861 | namestore_sqlite_iterate_records (void *cls, |
862 | const struct GNUNET_CRYPTO_EccPrivateKey *zone, | 862 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone, |
863 | uint64_t offset, | 863 | uint64_t offset, |
864 | GNUNET_NAMESTORE_RecordIterator iter, void *iter_cls) | 864 | GNUNET_NAMESTORE_RecordIterator iter, void *iter_cls) |
865 | { | 865 | { |
@@ -877,7 +877,7 @@ namestore_sqlite_iterate_records (void *cls, | |||
877 | { | 877 | { |
878 | stmt = plugin->iterate_zone; | 878 | stmt = plugin->iterate_zone; |
879 | err = ( (SQLITE_OK != sqlite3_bind_blob (stmt, 1, | 879 | err = ( (SQLITE_OK != sqlite3_bind_blob (stmt, 1, |
880 | zone, sizeof (struct GNUNET_CRYPTO_EccPrivateKey), | 880 | zone, sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey), |
881 | SQLITE_STATIC)) || | 881 | SQLITE_STATIC)) || |
882 | (SQLITE_OK != sqlite3_bind_int64 (stmt, 2, | 882 | (SQLITE_OK != sqlite3_bind_int64 (stmt, 2, |
883 | offset)) ); | 883 | offset)) ); |
@@ -909,8 +909,8 @@ namestore_sqlite_iterate_records (void *cls, | |||
909 | */ | 909 | */ |
910 | static int | 910 | static int |
911 | namestore_sqlite_zone_to_name (void *cls, | 911 | namestore_sqlite_zone_to_name (void *cls, |
912 | const struct GNUNET_CRYPTO_EccPrivateKey *zone, | 912 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone, |
913 | const struct GNUNET_CRYPTO_EccPublicSignKey *value_zone, | 913 | const struct GNUNET_CRYPTO_EcdsaPublicKey *value_zone, |
914 | GNUNET_NAMESTORE_RecordIterator iter, void *iter_cls) | 914 | GNUNET_NAMESTORE_RecordIterator iter, void *iter_cls) |
915 | { | 915 | { |
916 | struct Plugin *plugin = cls; | 916 | struct Plugin *plugin = cls; |
@@ -918,10 +918,10 @@ namestore_sqlite_zone_to_name (void *cls, | |||
918 | 918 | ||
919 | stmt = plugin->zone_to_name; | 919 | stmt = plugin->zone_to_name; |
920 | if ( (SQLITE_OK != sqlite3_bind_blob (stmt, 1, | 920 | if ( (SQLITE_OK != sqlite3_bind_blob (stmt, 1, |
921 | zone, sizeof (struct GNUNET_CRYPTO_EccPrivateKey), | 921 | zone, sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey), |
922 | SQLITE_STATIC)) || | 922 | SQLITE_STATIC)) || |
923 | (SQLITE_OK != sqlite3_bind_blob (stmt, 2, | 923 | (SQLITE_OK != sqlite3_bind_blob (stmt, 2, |
924 | value_zone, sizeof (struct GNUNET_CRYPTO_EccPublicSignKey), | 924 | value_zone, sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey), |
925 | SQLITE_STATIC)) ) | 925 | SQLITE_STATIC)) ) |
926 | { | 926 | { |
927 | LOG_SQLITE (plugin, GNUNET_ERROR_TYPE_ERROR | GNUNET_ERROR_TYPE_BULK, | 927 | LOG_SQLITE (plugin, GNUNET_ERROR_TYPE_ERROR | GNUNET_ERROR_TYPE_BULK, |
diff --git a/src/namestore/test_namestore_api_blocks.c b/src/namestore/test_namestore_api_blocks.c index e480def31..001e7e182 100644 --- a/src/namestore/test_namestore_api_blocks.c +++ b/src/namestore/test_namestore_api_blocks.c | |||
@@ -40,7 +40,7 @@ | |||
40 | #define TEST_REMOVE_RECORD_DATA 'b' | 40 | #define TEST_REMOVE_RECORD_DATA 'b' |
41 | 41 | ||
42 | 42 | ||
43 | static struct GNUNET_CRYPTO_EccPrivateKey * privkey; | 43 | static struct GNUNET_CRYPTO_EcdsaPrivateKey * privkey; |
44 | 44 | ||
45 | static struct GNUNET_NAMESTORE_RecordData *s_rd; | 45 | static struct GNUNET_NAMESTORE_RecordData *s_rd; |
46 | 46 | ||
@@ -99,19 +99,19 @@ run (void *cls, char *const *args, const char *cfgfile, | |||
99 | const struct GNUNET_CONFIGURATION_Handle *cfg) | 99 | const struct GNUNET_CONFIGURATION_Handle *cfg) |
100 | { | 100 | { |
101 | struct GNUNET_NAMESTORE_Block *block; | 101 | struct GNUNET_NAMESTORE_Block *block; |
102 | struct GNUNET_CRYPTO_EccPublicSignKey pubkey; | 102 | struct GNUNET_CRYPTO_EcdsaPublicKey pubkey; |
103 | 103 | ||
104 | /* load privat key */ | 104 | /* load privat key */ |
105 | char *hostkey_file; | 105 | char *hostkey_file; |
106 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, | 106 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, |
107 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); | 107 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); |
108 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 108 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
109 | privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file); | 109 | privkey = GNUNET_CRYPTO_ecdsa_key_create_from_file(hostkey_file); |
110 | GNUNET_free (hostkey_file); | 110 | GNUNET_free (hostkey_file); |
111 | GNUNET_assert (privkey != NULL); | 111 | GNUNET_assert (privkey != NULL); |
112 | struct GNUNET_TIME_Absolute expire = GNUNET_TIME_absolute_get(); | 112 | struct GNUNET_TIME_Absolute expire = GNUNET_TIME_absolute_get(); |
113 | /* get public key */ | 113 | /* get public key */ |
114 | GNUNET_CRYPTO_ecc_key_get_public_for_signature(privkey, &pubkey); | 114 | GNUNET_CRYPTO_ecdsa_key_get_public(privkey, &pubkey); |
115 | 115 | ||
116 | /* create record */ | 116 | /* create record */ |
117 | s_name = "DUMMY.dummy.gnunet"; | 117 | s_name = "DUMMY.dummy.gnunet"; |
diff --git a/src/namestore/test_namestore_api_cache_block.c b/src/namestore/test_namestore_api_cache_block.c index 8ed010abd..1fee80ec8 100644 --- a/src/namestore/test_namestore_api_cache_block.c +++ b/src/namestore/test_namestore_api_cache_block.c | |||
@@ -38,9 +38,9 @@ static struct GNUNET_NAMESTORE_Handle *nsh; | |||
38 | 38 | ||
39 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; | 39 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; |
40 | 40 | ||
41 | static struct GNUNET_CRYPTO_EccPrivateKey *privkey; | 41 | static struct GNUNET_CRYPTO_EcdsaPrivateKey *privkey; |
42 | 42 | ||
43 | static struct GNUNET_CRYPTO_EccPublicSignKey pubkey; | 43 | static struct GNUNET_CRYPTO_EcdsaPublicKey pubkey; |
44 | 44 | ||
45 | static int res; | 45 | static int res; |
46 | 46 | ||
@@ -182,10 +182,10 @@ run (void *cls, | |||
182 | DIR_SEPARATOR_STR, | 182 | DIR_SEPARATOR_STR, |
183 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); | 183 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); |
184 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 184 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
185 | privkey = GNUNET_CRYPTO_ecc_key_create_from_file (hostkey_file); | 185 | privkey = GNUNET_CRYPTO_ecdsa_key_create_from_file (hostkey_file); |
186 | GNUNET_free (hostkey_file); | 186 | GNUNET_free (hostkey_file); |
187 | GNUNET_assert (privkey != NULL); | 187 | GNUNET_assert (privkey != NULL); |
188 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (privkey, &pubkey); | 188 | GNUNET_CRYPTO_ecdsa_key_get_public (privkey, &pubkey); |
189 | 189 | ||
190 | 190 | ||
191 | rd.expiration_time = GNUNET_TIME_absolute_get().abs_value_us; | 191 | rd.expiration_time = GNUNET_TIME_absolute_get().abs_value_us; |
diff --git a/src/namestore/test_namestore_api_lookup_public.c b/src/namestore/test_namestore_api_lookup_public.c index f2b009ac5..6c6ee55ec 100644 --- a/src/namestore/test_namestore_api_lookup_public.c +++ b/src/namestore/test_namestore_api_lookup_public.c | |||
@@ -38,9 +38,9 @@ static struct GNUNET_NAMESTORE_Handle *nsh; | |||
38 | 38 | ||
39 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; | 39 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; |
40 | 40 | ||
41 | static struct GNUNET_CRYPTO_EccPrivateKey *privkey; | 41 | static struct GNUNET_CRYPTO_EcdsaPrivateKey *privkey; |
42 | 42 | ||
43 | static struct GNUNET_CRYPTO_EccPublicSignKey pubkey; | 43 | static struct GNUNET_CRYPTO_EcdsaPublicKey pubkey; |
44 | 44 | ||
45 | static int res; | 45 | static int res; |
46 | 46 | ||
@@ -149,7 +149,7 @@ put_cont (void *cls, int32_t success, const char *emsg) | |||
149 | { | 149 | { |
150 | const char *name = cls; | 150 | const char *name = cls; |
151 | struct GNUNET_HashCode derived_hash; | 151 | struct GNUNET_HashCode derived_hash; |
152 | struct GNUNET_CRYPTO_EccPublicSignKey pubkey; | 152 | struct GNUNET_CRYPTO_EcdsaPublicKey pubkey; |
153 | 153 | ||
154 | GNUNET_assert (NULL != cls); | 154 | GNUNET_assert (NULL != cls); |
155 | 155 | ||
@@ -159,7 +159,7 @@ put_cont (void *cls, int32_t success, const char *emsg) | |||
159 | (success == GNUNET_OK) ? "SUCCESS" : "FAIL"); | 159 | (success == GNUNET_OK) ? "SUCCESS" : "FAIL"); |
160 | 160 | ||
161 | /* Create derived hash */ | 161 | /* Create derived hash */ |
162 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (privkey, &pubkey); | 162 | GNUNET_CRYPTO_ecdsa_key_get_public (privkey, &pubkey); |
163 | GNUNET_NAMESTORE_query_from_public_key (&pubkey, name, &derived_hash); | 163 | GNUNET_NAMESTORE_query_from_public_key (&pubkey, name, &derived_hash); |
164 | 164 | ||
165 | nsqe = GNUNET_NAMESTORE_lookup_block (nsh, &derived_hash, | 165 | nsqe = GNUNET_NAMESTORE_lookup_block (nsh, &derived_hash, |
@@ -183,10 +183,10 @@ run (void *cls, | |||
183 | DIR_SEPARATOR_STR, | 183 | DIR_SEPARATOR_STR, |
184 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); | 184 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); |
185 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 185 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
186 | privkey = GNUNET_CRYPTO_ecc_key_create_from_file (hostkey_file); | 186 | privkey = GNUNET_CRYPTO_ecdsa_key_create_from_file (hostkey_file); |
187 | GNUNET_free (hostkey_file); | 187 | GNUNET_free (hostkey_file); |
188 | GNUNET_assert (privkey != NULL); | 188 | GNUNET_assert (privkey != NULL); |
189 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (privkey, &pubkey); | 189 | GNUNET_CRYPTO_ecdsa_key_get_public (privkey, &pubkey); |
190 | 190 | ||
191 | 191 | ||
192 | rd.expiration_time = GNUNET_TIME_absolute_get().abs_value_us; | 192 | rd.expiration_time = GNUNET_TIME_absolute_get().abs_value_us; |
diff --git a/src/namestore/test_namestore_api_monitoring.c b/src/namestore/test_namestore_api_monitoring.c index d0662617e..2d5888a5e 100644 --- a/src/namestore/test_namestore_api_monitoring.c +++ b/src/namestore/test_namestore_api_monitoring.c | |||
@@ -34,9 +34,9 @@ static struct GNUNET_NAMESTORE_Handle * nsh; | |||
34 | 34 | ||
35 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; | 35 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; |
36 | 36 | ||
37 | static struct GNUNET_CRYPTO_EccPrivateKey * privkey; | 37 | static struct GNUNET_CRYPTO_EcdsaPrivateKey * privkey; |
38 | 38 | ||
39 | static struct GNUNET_CRYPTO_EccPrivateKey * privkey2; | 39 | static struct GNUNET_CRYPTO_EcdsaPrivateKey * privkey2; |
40 | 40 | ||
41 | static struct GNUNET_NAMESTORE_ZoneMonitor *zm; | 41 | static struct GNUNET_NAMESTORE_ZoneMonitor *zm; |
42 | 42 | ||
@@ -145,7 +145,7 @@ end (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc) | |||
145 | 145 | ||
146 | static void | 146 | static void |
147 | zone_proc (void *cls, | 147 | zone_proc (void *cls, |
148 | const struct GNUNET_CRYPTO_EccPrivateKey *zone_key, | 148 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key, |
149 | const char *name, | 149 | const char *name, |
150 | unsigned int rd_count, | 150 | unsigned int rd_count, |
151 | const struct GNUNET_NAMESTORE_RecordData *rd) | 151 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -156,7 +156,7 @@ zone_proc (void *cls, | |||
156 | "Comparing results name %s\n", | 156 | "Comparing results name %s\n", |
157 | name); | 157 | name); |
158 | 158 | ||
159 | if (0 != memcmp (zone_key, privkey, sizeof (struct GNUNET_CRYPTO_EccPrivateKey))) | 159 | if (0 != memcmp (zone_key, privkey, sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey))) |
160 | { | 160 | { |
161 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, | 161 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, |
162 | "Monitoring returned wrong zone key\n"); | 162 | "Monitoring returned wrong zone key\n"); |
@@ -268,7 +268,7 @@ run (void *cls, | |||
268 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); | 268 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); |
269 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, | 269 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, |
270 | "Using zonekey file `%s' \n", hostkey_file); | 270 | "Using zonekey file `%s' \n", hostkey_file); |
271 | privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file); | 271 | privkey = GNUNET_CRYPTO_ecdsa_key_create_from_file(hostkey_file); |
272 | GNUNET_free (hostkey_file); | 272 | GNUNET_free (hostkey_file); |
273 | GNUNET_assert (privkey != NULL); | 273 | GNUNET_assert (privkey != NULL); |
274 | 274 | ||
@@ -301,7 +301,7 @@ run (void *cls, | |||
301 | DIR_SEPARATOR_STR, | 301 | DIR_SEPARATOR_STR, |
302 | "HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey"); | 302 | "HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey"); |
303 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 303 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
304 | privkey2 = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file); | 304 | privkey2 = GNUNET_CRYPTO_ecdsa_key_create_from_file(hostkey_file); |
305 | GNUNET_free (hostkey_file); | 305 | GNUNET_free (hostkey_file); |
306 | GNUNET_assert (privkey2 != NULL); | 306 | GNUNET_assert (privkey2 != NULL); |
307 | 307 | ||
diff --git a/src/namestore/test_namestore_api_monitoring_existing.c b/src/namestore/test_namestore_api_monitoring_existing.c index 4db1c6d62..3b2ca6092 100644 --- a/src/namestore/test_namestore_api_monitoring_existing.c +++ b/src/namestore/test_namestore_api_monitoring_existing.c | |||
@@ -35,9 +35,9 @@ static struct GNUNET_NAMESTORE_Handle * nsh; | |||
35 | 35 | ||
36 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; | 36 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; |
37 | 37 | ||
38 | static struct GNUNET_CRYPTO_EccPrivateKey * privkey; | 38 | static struct GNUNET_CRYPTO_EcdsaPrivateKey * privkey; |
39 | 39 | ||
40 | static struct GNUNET_CRYPTO_EccPrivateKey * privkey2; | 40 | static struct GNUNET_CRYPTO_EcdsaPrivateKey * privkey2; |
41 | 41 | ||
42 | static struct GNUNET_NAMESTORE_ZoneMonitor *zm; | 42 | static struct GNUNET_NAMESTORE_ZoneMonitor *zm; |
43 | 43 | ||
@@ -146,7 +146,7 @@ end (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc) | |||
146 | 146 | ||
147 | static void | 147 | static void |
148 | zone_proc (void *cls, | 148 | zone_proc (void *cls, |
149 | const struct GNUNET_CRYPTO_EccPrivateKey *zone_key, | 149 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key, |
150 | const char *name, | 150 | const char *name, |
151 | unsigned int rd_count, | 151 | unsigned int rd_count, |
152 | const struct GNUNET_NAMESTORE_RecordData *rd) | 152 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -157,7 +157,7 @@ zone_proc (void *cls, | |||
157 | "Comparing results name %s\n", | 157 | "Comparing results name %s\n", |
158 | name); | 158 | name); |
159 | 159 | ||
160 | if (0 != memcmp (zone_key, privkey, sizeof (struct GNUNET_CRYPTO_EccPrivateKey))) | 160 | if (0 != memcmp (zone_key, privkey, sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey))) |
161 | { | 161 | { |
162 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, | 162 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, |
163 | "Monitoring returned wrong zone key\n"); | 163 | "Monitoring returned wrong zone key\n"); |
@@ -286,7 +286,7 @@ run (void *cls, | |||
286 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); | 286 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); |
287 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, | 287 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, |
288 | "Using zonekey file `%s' \n", hostkey_file); | 288 | "Using zonekey file `%s' \n", hostkey_file); |
289 | privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file); | 289 | privkey = GNUNET_CRYPTO_ecdsa_key_create_from_file(hostkey_file); |
290 | GNUNET_free (hostkey_file); | 290 | GNUNET_free (hostkey_file); |
291 | GNUNET_assert (privkey != NULL); | 291 | GNUNET_assert (privkey != NULL); |
292 | 292 | ||
@@ -306,7 +306,7 @@ run (void *cls, | |||
306 | DIR_SEPARATOR_STR, | 306 | DIR_SEPARATOR_STR, |
307 | "HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey"); | 307 | "HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey"); |
308 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 308 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
309 | privkey2 = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file); | 309 | privkey2 = GNUNET_CRYPTO_ecdsa_key_create_from_file(hostkey_file); |
310 | GNUNET_free (hostkey_file); | 310 | GNUNET_free (hostkey_file); |
311 | GNUNET_assert (privkey2 != NULL); | 311 | GNUNET_assert (privkey2 != NULL); |
312 | 312 | ||
diff --git a/src/namestore/test_namestore_api_put.c b/src/namestore/test_namestore_api_put.c index e3610ccaf..983ea6804 100644 --- a/src/namestore/test_namestore_api_put.c +++ b/src/namestore/test_namestore_api_put.c | |||
@@ -41,9 +41,9 @@ static struct GNUNET_NAMESTORE_Handle * nsh; | |||
41 | 41 | ||
42 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; | 42 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; |
43 | 43 | ||
44 | static struct GNUNET_CRYPTO_EccPrivateKey * privkey; | 44 | static struct GNUNET_CRYPTO_EcdsaPrivateKey * privkey; |
45 | 45 | ||
46 | static struct GNUNET_CRYPTO_EccPublicSignKey pubkey; | 46 | static struct GNUNET_CRYPTO_EcdsaPublicKey pubkey; |
47 | 47 | ||
48 | static struct GNUNET_NAMESTORE_RecordData *s_rd; | 48 | static struct GNUNET_NAMESTORE_RecordData *s_rd; |
49 | 49 | ||
@@ -135,7 +135,7 @@ run (void *cls, | |||
135 | const struct GNUNET_CONFIGURATION_Handle *cfg, | 135 | const struct GNUNET_CONFIGURATION_Handle *cfg, |
136 | struct GNUNET_TESTING_Peer *peer) | 136 | struct GNUNET_TESTING_Peer *peer) |
137 | { | 137 | { |
138 | struct GNUNET_CRYPTO_EccSignature *signature; | 138 | struct GNUNET_CRYPTO_EcdsaSignature *signature; |
139 | char * s_name; | 139 | char * s_name; |
140 | int c; | 140 | int c; |
141 | char *hostkey_file; | 141 | char *hostkey_file; |
@@ -146,11 +146,11 @@ run (void *cls, | |||
146 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, | 146 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, |
147 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); | 147 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); |
148 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 148 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
149 | privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file); | 149 | privkey = GNUNET_CRYPTO_ecdsa_key_create_from_file(hostkey_file); |
150 | GNUNET_assert (privkey != NULL); | 150 | GNUNET_assert (privkey != NULL); |
151 | GNUNET_free (hostkey_file); | 151 | GNUNET_free (hostkey_file); |
152 | /* get public key */ | 152 | /* get public key */ |
153 | GNUNET_CRYPTO_ecc_key_get_public_for_signature(privkey, &pubkey); | 153 | GNUNET_CRYPTO_ecdsa_key_get_public(privkey, &pubkey); |
154 | nsh = GNUNET_NAMESTORE_connect (cfg); | 154 | nsh = GNUNET_NAMESTORE_connect (cfg); |
155 | GNUNET_break (NULL != nsh); | 155 | GNUNET_break (NULL != nsh); |
156 | /* create record */ | 156 | /* create record */ |
diff --git a/src/namestore/test_namestore_api_remove.c b/src/namestore/test_namestore_api_remove.c index 3f3823e89..f43bafecc 100644 --- a/src/namestore/test_namestore_api_remove.c +++ b/src/namestore/test_namestore_api_remove.c | |||
@@ -38,9 +38,9 @@ static struct GNUNET_NAMESTORE_Handle *nsh; | |||
38 | 38 | ||
39 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; | 39 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; |
40 | 40 | ||
41 | static struct GNUNET_CRYPTO_EccPrivateKey *privkey; | 41 | static struct GNUNET_CRYPTO_EcdsaPrivateKey *privkey; |
42 | 42 | ||
43 | static struct GNUNET_CRYPTO_EccPublicSignKey pubkey; | 43 | static struct GNUNET_CRYPTO_EcdsaPublicKey pubkey; |
44 | 44 | ||
45 | static struct GNUNET_HashCode derived_hash; | 45 | static struct GNUNET_HashCode derived_hash; |
46 | 46 | ||
@@ -244,10 +244,10 @@ run (void *cls, | |||
244 | DIR_SEPARATOR_STR, | 244 | DIR_SEPARATOR_STR, |
245 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); | 245 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); |
246 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 246 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
247 | privkey = GNUNET_CRYPTO_ecc_key_create_from_file (hostkey_file); | 247 | privkey = GNUNET_CRYPTO_ecdsa_key_create_from_file (hostkey_file); |
248 | GNUNET_free (hostkey_file); | 248 | GNUNET_free (hostkey_file); |
249 | GNUNET_assert (privkey != NULL); | 249 | GNUNET_assert (privkey != NULL); |
250 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (privkey, &pubkey); | 250 | GNUNET_CRYPTO_ecdsa_key_get_public (privkey, &pubkey); |
251 | 251 | ||
252 | removed = GNUNET_NO; | 252 | removed = GNUNET_NO; |
253 | 253 | ||
diff --git a/src/namestore/test_namestore_api_remove_not_existing_record.c b/src/namestore/test_namestore_api_remove_not_existing_record.c index 86cf47e26..231d7b0bc 100644 --- a/src/namestore/test_namestore_api_remove_not_existing_record.c +++ b/src/namestore/test_namestore_api_remove_not_existing_record.c | |||
@@ -38,9 +38,9 @@ static struct GNUNET_NAMESTORE_Handle *nsh; | |||
38 | 38 | ||
39 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; | 39 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; |
40 | 40 | ||
41 | static struct GNUNET_CRYPTO_EccPrivateKey *privkey; | 41 | static struct GNUNET_CRYPTO_EcdsaPrivateKey *privkey; |
42 | 42 | ||
43 | static struct GNUNET_CRYPTO_EccPublicSignKey pubkey; | 43 | static struct GNUNET_CRYPTO_EcdsaPublicKey pubkey; |
44 | 44 | ||
45 | static int res; | 45 | static int res; |
46 | 46 | ||
@@ -148,10 +148,10 @@ run (void *cls, | |||
148 | DIR_SEPARATOR_STR, | 148 | DIR_SEPARATOR_STR, |
149 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); | 149 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); |
150 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 150 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
151 | privkey = GNUNET_CRYPTO_ecc_key_create_from_file (hostkey_file); | 151 | privkey = GNUNET_CRYPTO_ecdsa_key_create_from_file (hostkey_file); |
152 | GNUNET_free (hostkey_file); | 152 | GNUNET_free (hostkey_file); |
153 | GNUNET_assert (privkey != NULL); | 153 | GNUNET_assert (privkey != NULL); |
154 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (privkey, &pubkey); | 154 | GNUNET_CRYPTO_ecdsa_key_get_public (privkey, &pubkey); |
155 | 155 | ||
156 | nsh = GNUNET_NAMESTORE_connect (cfg); | 156 | nsh = GNUNET_NAMESTORE_connect (cfg); |
157 | GNUNET_break (NULL != nsh); | 157 | GNUNET_break (NULL != nsh); |
diff --git a/src/namestore/test_namestore_api_store.c b/src/namestore/test_namestore_api_store.c index 69c47337f..133bf567f 100644 --- a/src/namestore/test_namestore_api_store.c +++ b/src/namestore/test_namestore_api_store.c | |||
@@ -38,9 +38,9 @@ static struct GNUNET_NAMESTORE_Handle *nsh; | |||
38 | 38 | ||
39 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; | 39 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; |
40 | 40 | ||
41 | static struct GNUNET_CRYPTO_EccPrivateKey *privkey; | 41 | static struct GNUNET_CRYPTO_EcdsaPrivateKey *privkey; |
42 | 42 | ||
43 | static struct GNUNET_CRYPTO_EccPublicSignKey pubkey; | 43 | static struct GNUNET_CRYPTO_EcdsaPublicKey pubkey; |
44 | 44 | ||
45 | static int res; | 45 | static int res; |
46 | 46 | ||
@@ -181,10 +181,10 @@ run (void *cls, | |||
181 | DIR_SEPARATOR_STR, | 181 | DIR_SEPARATOR_STR, |
182 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); | 182 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); |
183 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 183 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
184 | privkey = GNUNET_CRYPTO_ecc_key_create_from_file (hostkey_file); | 184 | privkey = GNUNET_CRYPTO_ecdsa_key_create_from_file (hostkey_file); |
185 | GNUNET_free (hostkey_file); | 185 | GNUNET_free (hostkey_file); |
186 | GNUNET_assert (privkey != NULL); | 186 | GNUNET_assert (privkey != NULL); |
187 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (privkey, &pubkey); | 187 | GNUNET_CRYPTO_ecdsa_key_get_public (privkey, &pubkey); |
188 | 188 | ||
189 | 189 | ||
190 | rd.expiration_time = GNUNET_TIME_absolute_get().abs_value_us; | 190 | rd.expiration_time = GNUNET_TIME_absolute_get().abs_value_us; |
diff --git a/src/namestore/test_namestore_api_store_update.c b/src/namestore/test_namestore_api_store_update.c index 8b10763c0..91b8511c9 100644 --- a/src/namestore/test_namestore_api_store_update.c +++ b/src/namestore/test_namestore_api_store_update.c | |||
@@ -46,9 +46,9 @@ static struct GNUNET_NAMESTORE_Handle *nsh; | |||
46 | 46 | ||
47 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; | 47 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; |
48 | 48 | ||
49 | static struct GNUNET_CRYPTO_EccPrivateKey *privkey; | 49 | static struct GNUNET_CRYPTO_EcdsaPrivateKey *privkey; |
50 | 50 | ||
51 | static struct GNUNET_CRYPTO_EccPublicSignKey pubkey; | 51 | static struct GNUNET_CRYPTO_EcdsaPublicKey pubkey; |
52 | 52 | ||
53 | static int res; | 53 | static int res; |
54 | 54 | ||
@@ -225,10 +225,10 @@ run (void *cls, | |||
225 | DIR_SEPARATOR_STR, | 225 | DIR_SEPARATOR_STR, |
226 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); | 226 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); |
227 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 227 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
228 | privkey = GNUNET_CRYPTO_ecc_key_create_from_file (hostkey_file); | 228 | privkey = GNUNET_CRYPTO_ecdsa_key_create_from_file (hostkey_file); |
229 | GNUNET_free (hostkey_file); | 229 | GNUNET_free (hostkey_file); |
230 | GNUNET_assert (privkey != NULL); | 230 | GNUNET_assert (privkey != NULL); |
231 | GNUNET_CRYPTO_ecc_key_get_public_for_signature (privkey, &pubkey); | 231 | GNUNET_CRYPTO_ecdsa_key_get_public (privkey, &pubkey); |
232 | 232 | ||
233 | rd.flags = GNUNET_NAMESTORE_RF_NONE; | 233 | rd.flags = GNUNET_NAMESTORE_RF_NONE; |
234 | rd.expiration_time = GNUNET_TIME_absolute_get().abs_value_us; | 234 | rd.expiration_time = GNUNET_TIME_absolute_get().abs_value_us; |
diff --git a/src/namestore/test_namestore_api_zone_iteration.c b/src/namestore/test_namestore_api_zone_iteration.c index 94fd6d008..48671897e 100644 --- a/src/namestore/test_namestore_api_zone_iteration.c +++ b/src/namestore/test_namestore_api_zone_iteration.c | |||
@@ -34,9 +34,9 @@ static struct GNUNET_NAMESTORE_Handle * nsh; | |||
34 | 34 | ||
35 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; | 35 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; |
36 | 36 | ||
37 | static struct GNUNET_CRYPTO_EccPrivateKey * privkey; | 37 | static struct GNUNET_CRYPTO_EcdsaPrivateKey * privkey; |
38 | 38 | ||
39 | static struct GNUNET_CRYPTO_EccPrivateKey * privkey2; | 39 | static struct GNUNET_CRYPTO_EcdsaPrivateKey * privkey2; |
40 | 40 | ||
41 | static struct GNUNET_NAMESTORE_ZoneIterator *zi; | 41 | static struct GNUNET_NAMESTORE_ZoneIterator *zi; |
42 | 42 | ||
@@ -156,7 +156,7 @@ end (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc) | |||
156 | 156 | ||
157 | static void | 157 | static void |
158 | zone_proc (void *cls, | 158 | zone_proc (void *cls, |
159 | const struct GNUNET_CRYPTO_EccPrivateKey *zone, | 159 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone, |
160 | const char *label, | 160 | const char *label, |
161 | unsigned int rd_count, | 161 | unsigned int rd_count, |
162 | const struct GNUNET_NAMESTORE_RecordData *rd) | 162 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -181,7 +181,7 @@ zone_proc (void *cls, | |||
181 | } | 181 | } |
182 | else | 182 | else |
183 | { | 183 | { |
184 | if (0 == memcmp (zone, privkey, sizeof (struct GNUNET_CRYPTO_EccPrivateKey))) | 184 | if (0 == memcmp (zone, privkey, sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey))) |
185 | { | 185 | { |
186 | if (0 == strcmp (label, s_name_1)) | 186 | if (0 == strcmp (label, s_name_1)) |
187 | { | 187 | { |
@@ -225,7 +225,7 @@ zone_proc (void *cls, | |||
225 | GNUNET_break (0); | 225 | GNUNET_break (0); |
226 | } | 226 | } |
227 | } | 227 | } |
228 | else if (0 == memcmp (zone, privkey2, sizeof (struct GNUNET_CRYPTO_EccPrivateKey))) | 228 | else if (0 == memcmp (zone, privkey2, sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey))) |
229 | { | 229 | { |
230 | if (0 == strcmp (label, s_name_3)) | 230 | if (0 == strcmp (label, s_name_3)) |
231 | { | 231 | { |
@@ -345,7 +345,7 @@ create_record (unsigned int count) | |||
345 | */ | 345 | */ |
346 | static void | 346 | static void |
347 | empty_zone_proc (void *cls, | 347 | empty_zone_proc (void *cls, |
348 | const struct GNUNET_CRYPTO_EccPrivateKey *zone, | 348 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone, |
349 | const char *label, | 349 | const char *label, |
350 | unsigned int rd_count, | 350 | unsigned int rd_count, |
351 | const struct GNUNET_NAMESTORE_RecordData *rd) | 351 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -379,14 +379,14 @@ empty_zone_proc (void *cls, | |||
379 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, | 379 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, |
380 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); | 380 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); |
381 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 381 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
382 | privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file); | 382 | privkey = GNUNET_CRYPTO_ecdsa_key_create_from_file(hostkey_file); |
383 | GNUNET_free (hostkey_file); | 383 | GNUNET_free (hostkey_file); |
384 | GNUNET_assert (privkey != NULL); | 384 | GNUNET_assert (privkey != NULL); |
385 | 385 | ||
386 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, | 386 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, |
387 | "HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey"); | 387 | "HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey"); |
388 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 388 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
389 | privkey2 = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file); | 389 | privkey2 = GNUNET_CRYPTO_ecdsa_key_create_from_file(hostkey_file); |
390 | GNUNET_free (hostkey_file); | 390 | GNUNET_free (hostkey_file); |
391 | GNUNET_assert (privkey2 != NULL); | 391 | GNUNET_assert (privkey2 != NULL); |
392 | 392 | ||
diff --git a/src/namestore/test_namestore_api_zone_iteration_specific_zone.c b/src/namestore/test_namestore_api_zone_iteration_specific_zone.c index a34e742f0..7707c418e 100644 --- a/src/namestore/test_namestore_api_zone_iteration_specific_zone.c +++ b/src/namestore/test_namestore_api_zone_iteration_specific_zone.c | |||
@@ -34,9 +34,9 @@ static struct GNUNET_NAMESTORE_Handle * nsh; | |||
34 | 34 | ||
35 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; | 35 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; |
36 | 36 | ||
37 | static struct GNUNET_CRYPTO_EccPrivateKey * privkey; | 37 | static struct GNUNET_CRYPTO_EcdsaPrivateKey * privkey; |
38 | 38 | ||
39 | static struct GNUNET_CRYPTO_EccPrivateKey * privkey2; | 39 | static struct GNUNET_CRYPTO_EcdsaPrivateKey * privkey2; |
40 | 40 | ||
41 | static struct GNUNET_NAMESTORE_ZoneIterator *zi; | 41 | static struct GNUNET_NAMESTORE_ZoneIterator *zi; |
42 | 42 | ||
@@ -156,7 +156,7 @@ end (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc) | |||
156 | 156 | ||
157 | static void | 157 | static void |
158 | zone_proc (void *cls, | 158 | zone_proc (void *cls, |
159 | const struct GNUNET_CRYPTO_EccPrivateKey *zone, | 159 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone, |
160 | const char *label, | 160 | const char *label, |
161 | unsigned int rd_count, | 161 | unsigned int rd_count, |
162 | const struct GNUNET_NAMESTORE_RecordData *rd) | 162 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -181,7 +181,7 @@ zone_proc (void *cls, | |||
181 | } | 181 | } |
182 | else | 182 | else |
183 | { | 183 | { |
184 | if (0 == memcmp (zone, privkey, sizeof (struct GNUNET_CRYPTO_EccPrivateKey))) | 184 | if (0 == memcmp (zone, privkey, sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey))) |
185 | { | 185 | { |
186 | if (0 == strcmp (label, s_name_1)) | 186 | if (0 == strcmp (label, s_name_1)) |
187 | { | 187 | { |
@@ -225,7 +225,7 @@ zone_proc (void *cls, | |||
225 | GNUNET_break (0); | 225 | GNUNET_break (0); |
226 | } | 226 | } |
227 | } | 227 | } |
228 | else if (0 == memcmp (zone, privkey2, sizeof (struct GNUNET_CRYPTO_EccPrivateKey))) | 228 | else if (0 == memcmp (zone, privkey2, sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey))) |
229 | { | 229 | { |
230 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Received data for not requested zone\n"); | 230 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Received data for not requested zone\n"); |
231 | failed = GNUNET_YES; | 231 | failed = GNUNET_YES; |
@@ -323,7 +323,7 @@ create_record (unsigned int count) | |||
323 | */ | 323 | */ |
324 | static void | 324 | static void |
325 | empty_zone_proc (void *cls, | 325 | empty_zone_proc (void *cls, |
326 | const struct GNUNET_CRYPTO_EccPrivateKey *zone, | 326 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone, |
327 | const char *label, | 327 | const char *label, |
328 | unsigned int rd_count, | 328 | unsigned int rd_count, |
329 | const struct GNUNET_NAMESTORE_RecordData *rd) | 329 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -357,14 +357,14 @@ empty_zone_proc (void *cls, | |||
357 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, | 357 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, |
358 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); | 358 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); |
359 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 359 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
360 | privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file); | 360 | privkey = GNUNET_CRYPTO_ecdsa_key_create_from_file(hostkey_file); |
361 | GNUNET_free (hostkey_file); | 361 | GNUNET_free (hostkey_file); |
362 | GNUNET_assert (privkey != NULL); | 362 | GNUNET_assert (privkey != NULL); |
363 | 363 | ||
364 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, | 364 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, |
365 | "HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey"); | 365 | "HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey"); |
366 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 366 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
367 | privkey2 = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file); | 367 | privkey2 = GNUNET_CRYPTO_ecdsa_key_create_from_file(hostkey_file); |
368 | GNUNET_free (hostkey_file); | 368 | GNUNET_free (hostkey_file); |
369 | GNUNET_assert (privkey2 != NULL); | 369 | GNUNET_assert (privkey2 != NULL); |
370 | 370 | ||
diff --git a/src/namestore/test_namestore_api_zone_iteration_stop.c b/src/namestore/test_namestore_api_zone_iteration_stop.c index ebc26db79..e56559f96 100644 --- a/src/namestore/test_namestore_api_zone_iteration_stop.c +++ b/src/namestore/test_namestore_api_zone_iteration_stop.c | |||
@@ -34,9 +34,9 @@ static struct GNUNET_NAMESTORE_Handle * nsh; | |||
34 | 34 | ||
35 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; | 35 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; |
36 | 36 | ||
37 | static struct GNUNET_CRYPTO_EccPrivateKey * privkey; | 37 | static struct GNUNET_CRYPTO_EcdsaPrivateKey * privkey; |
38 | 38 | ||
39 | static struct GNUNET_CRYPTO_EccPrivateKey * privkey2; | 39 | static struct GNUNET_CRYPTO_EcdsaPrivateKey * privkey2; |
40 | 40 | ||
41 | static struct GNUNET_NAMESTORE_ZoneIterator *zi; | 41 | static struct GNUNET_NAMESTORE_ZoneIterator *zi; |
42 | 42 | ||
@@ -156,7 +156,7 @@ end (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc) | |||
156 | 156 | ||
157 | static void | 157 | static void |
158 | zone_proc (void *cls, | 158 | zone_proc (void *cls, |
159 | const struct GNUNET_CRYPTO_EccPrivateKey *zone, | 159 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone, |
160 | const char *label, | 160 | const char *label, |
161 | unsigned int rd_count, | 161 | unsigned int rd_count, |
162 | const struct GNUNET_NAMESTORE_RecordData *rd) | 162 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -178,7 +178,7 @@ zone_proc (void *cls, | |||
178 | } | 178 | } |
179 | else | 179 | else |
180 | { | 180 | { |
181 | if (0 == memcmp (zone, privkey, sizeof (struct GNUNET_CRYPTO_EccPrivateKey))) | 181 | if (0 == memcmp (zone, privkey, sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey))) |
182 | { | 182 | { |
183 | if (0 == strcmp (label, s_name_1)) | 183 | if (0 == strcmp (label, s_name_1)) |
184 | { | 184 | { |
@@ -222,7 +222,7 @@ zone_proc (void *cls, | |||
222 | GNUNET_break (0); | 222 | GNUNET_break (0); |
223 | } | 223 | } |
224 | } | 224 | } |
225 | else if (0 == memcmp (zone, privkey2, sizeof (struct GNUNET_CRYPTO_EccPrivateKey))) | 225 | else if (0 == memcmp (zone, privkey2, sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey))) |
226 | { | 226 | { |
227 | if (0 == strcmp (label, s_name_3)) | 227 | if (0 == strcmp (label, s_name_3)) |
228 | { | 228 | { |
@@ -357,7 +357,7 @@ create_record (unsigned int count) | |||
357 | */ | 357 | */ |
358 | static void | 358 | static void |
359 | empty_zone_proc (void *cls, | 359 | empty_zone_proc (void *cls, |
360 | const struct GNUNET_CRYPTO_EccPrivateKey *zone, | 360 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone, |
361 | const char *label, | 361 | const char *label, |
362 | unsigned int rd_count, | 362 | unsigned int rd_count, |
363 | const struct GNUNET_NAMESTORE_RecordData *rd) | 363 | const struct GNUNET_NAMESTORE_RecordData *rd) |
@@ -391,14 +391,14 @@ empty_zone_proc (void *cls, | |||
391 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, | 391 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, |
392 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); | 392 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); |
393 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 393 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
394 | privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file); | 394 | privkey = GNUNET_CRYPTO_ecdsa_key_create_from_file(hostkey_file); |
395 | GNUNET_free (hostkey_file); | 395 | GNUNET_free (hostkey_file); |
396 | GNUNET_assert (privkey != NULL); | 396 | GNUNET_assert (privkey != NULL); |
397 | 397 | ||
398 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, | 398 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, |
399 | "HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey"); | 399 | "HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey"); |
400 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 400 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
401 | privkey2 = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file); | 401 | privkey2 = GNUNET_CRYPTO_ecdsa_key_create_from_file(hostkey_file); |
402 | GNUNET_free (hostkey_file); | 402 | GNUNET_free (hostkey_file); |
403 | GNUNET_assert (privkey2 != NULL); | 403 | GNUNET_assert (privkey2 != NULL); |
404 | 404 | ||
diff --git a/src/namestore/test_namestore_api_zone_to_name.c b/src/namestore/test_namestore_api_zone_to_name.c index 1eeed1001..973cc18a0 100644 --- a/src/namestore/test_namestore_api_zone_to_name.c +++ b/src/namestore/test_namestore_api_zone_to_name.c | |||
@@ -41,9 +41,9 @@ static struct GNUNET_NAMESTORE_Handle * nsh; | |||
41 | 41 | ||
42 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; | 42 | static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; |
43 | 43 | ||
44 | static struct GNUNET_CRYPTO_EccPrivateKey * privkey; | 44 | static struct GNUNET_CRYPTO_EcdsaPrivateKey * privkey; |
45 | 45 | ||
46 | static struct GNUNET_CRYPTO_EccPublicSignKey pubkey; | 46 | static struct GNUNET_CRYPTO_EcdsaPublicKey pubkey; |
47 | 47 | ||
48 | static struct GNUNET_TIME_Absolute expire; | 48 | static struct GNUNET_TIME_Absolute expire; |
49 | 49 | ||
@@ -53,7 +53,7 @@ static struct GNUNET_CRYPTO_ShortHashCode s_zone_value; | |||
53 | 53 | ||
54 | static char * s_name; | 54 | static char * s_name; |
55 | 55 | ||
56 | static struct GNUNET_CRYPTO_EccSignature *s_signature; | 56 | static struct GNUNET_CRYPTO_EcdsaSignature *s_signature; |
57 | 57 | ||
58 | static int res; | 58 | static int res; |
59 | 59 | ||
@@ -96,12 +96,12 @@ end (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc) | |||
96 | 96 | ||
97 | static void | 97 | static void |
98 | zone_to_name_proc (void *cls, | 98 | zone_to_name_proc (void *cls, |
99 | const struct GNUNET_CRYPTO_EccPublicSignKey *zone_key, | 99 | const struct GNUNET_CRYPTO_EcdsaPublicKey *zone_key, |
100 | struct GNUNET_TIME_Absolute expire, | 100 | struct GNUNET_TIME_Absolute expire, |
101 | const char *n, | 101 | const char *n, |
102 | unsigned int rd_count, | 102 | unsigned int rd_count, |
103 | const struct GNUNET_NAMESTORE_RecordData *rd, | 103 | const struct GNUNET_NAMESTORE_RecordData *rd, |
104 | const struct GNUNET_CRYPTO_EccSignature *signature) | 104 | const struct GNUNET_CRYPTO_EcdsaSignature *signature) |
105 | { | 105 | { |
106 | int fail = GNUNET_NO; | 106 | int fail = GNUNET_NO; |
107 | 107 | ||
@@ -123,7 +123,7 @@ zone_to_name_proc (void *cls, | |||
123 | fail = GNUNET_YES; | 123 | fail = GNUNET_YES; |
124 | GNUNET_break (0); | 124 | GNUNET_break (0); |
125 | } | 125 | } |
126 | if ((zone_key == NULL) || (0 != memcmp (zone_key, &pubkey, sizeof (struct GNUNET_CRYPTO_EccPublicSignKey)))) | 126 | if ((zone_key == NULL) || (0 != memcmp (zone_key, &pubkey, sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey)))) |
127 | { | 127 | { |
128 | fail = GNUNET_YES; | 128 | fail = GNUNET_YES; |
129 | GNUNET_break (0); | 129 | GNUNET_break (0); |
@@ -173,14 +173,14 @@ run (void *cls, | |||
173 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, | 173 | GNUNET_asprintf(&hostkey_file,"zonefiles%s%s",DIR_SEPARATOR_STR, |
174 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); | 174 | "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); |
175 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); | 175 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); |
176 | privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file); | 176 | privkey = GNUNET_CRYPTO_ecdsa_key_create_from_file(hostkey_file); |
177 | GNUNET_free (hostkey_file); | 177 | GNUNET_free (hostkey_file); |
178 | GNUNET_assert (privkey != NULL); | 178 | GNUNET_assert (privkey != NULL); |
179 | /* get public key */ | 179 | /* get public key */ |
180 | GNUNET_CRYPTO_ecc_key_get_public_for_signature(privkey, &pubkey); | 180 | GNUNET_CRYPTO_ecdsa_key_get_public(privkey, &pubkey); |
181 | 181 | ||
182 | /* zone hash */ | 182 | /* zone hash */ |
183 | GNUNET_CRYPTO_short_hash (&pubkey, sizeof (struct GNUNET_CRYPTO_EccPublicSignKey), &s_zone); | 183 | GNUNET_CRYPTO_short_hash (&pubkey, sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey), &s_zone); |
184 | GNUNET_CRYPTO_short_hash (s_name, strlen (s_name) + 1, &s_zone_value); | 184 | GNUNET_CRYPTO_short_hash (s_name, strlen (s_name) + 1, &s_zone_value); |
185 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using PKEY `%s' \n", GNUNET_NAMESTORE_short_h2s (&s_zone_value)); | 185 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using PKEY `%s' \n", GNUNET_NAMESTORE_short_h2s (&s_zone_value)); |
186 | 186 | ||
diff --git a/src/namestore/test_plugin_namestore.c b/src/namestore/test_plugin_namestore.c index 5274e8bca..7e77f4317 100644 --- a/src/namestore/test_plugin_namestore.c +++ b/src/namestore/test_plugin_namestore.c | |||
@@ -81,14 +81,14 @@ load_plugin (const struct GNUNET_CONFIGURATION_Handle *cfg) | |||
81 | 81 | ||
82 | static void | 82 | static void |
83 | test_record (void *cls, | 83 | test_record (void *cls, |
84 | const struct GNUNET_CRYPTO_EccPrivateKey *private_key, | 84 | const struct GNUNET_CRYPTO_EcdsaPrivateKey *private_key, |
85 | const char *label, | 85 | const char *label, |
86 | unsigned int rd_count, | 86 | unsigned int rd_count, |
87 | const struct GNUNET_NAMESTORE_RecordData *rd) | 87 | const struct GNUNET_NAMESTORE_RecordData *rd) |
88 | { | 88 | { |
89 | int *idp = cls; | 89 | int *idp = cls; |
90 | int id = *idp; | 90 | int id = *idp; |
91 | struct GNUNET_CRYPTO_EccPrivateKey tzone_private_key; | 91 | struct GNUNET_CRYPTO_EcdsaPrivateKey tzone_private_key; |
92 | char tname[64]; | 92 | char tname[64]; |
93 | unsigned int trd_count = 1 + (id % 1024); | 93 | unsigned int trd_count = 1 + (id % 1024); |
94 | unsigned int i; | 94 | unsigned int i; |
@@ -104,7 +104,7 @@ test_record (void *cls, | |||
104 | } | 104 | } |
105 | memset (&tzone_private_key, (id % 241), sizeof (tzone_private_key)); | 105 | memset (&tzone_private_key, (id % 241), sizeof (tzone_private_key)); |
106 | GNUNET_assert (0 == strcmp (label, tname)); | 106 | GNUNET_assert (0 == strcmp (label, tname)); |
107 | GNUNET_assert (0 == memcmp (&tzone_private_key, private_key, sizeof (struct GNUNET_CRYPTO_EccPrivateKey))); | 107 | GNUNET_assert (0 == memcmp (&tzone_private_key, private_key, sizeof (struct GNUNET_CRYPTO_EcdsaPrivateKey))); |
108 | } | 108 | } |
109 | 109 | ||
110 | 110 | ||
@@ -119,11 +119,11 @@ get_record (struct GNUNET_NAMESTORE_PluginFunctions *nsp, int id) | |||
119 | static void | 119 | static void |
120 | put_record (struct GNUNET_NAMESTORE_PluginFunctions *nsp, int id) | 120 | put_record (struct GNUNET_NAMESTORE_PluginFunctions *nsp, int id) |
121 | { | 121 | { |
122 | struct GNUNET_CRYPTO_EccPrivateKey zone_private_key; | 122 | struct GNUNET_CRYPTO_EcdsaPrivateKey zone_private_key; |
123 | char label[64]; | 123 | char label[64]; |
124 | unsigned int rd_count = 1 + (id % 1024); | 124 | unsigned int rd_count = 1 + (id % 1024); |
125 | struct GNUNET_NAMESTORE_RecordData rd[rd_count]; | 125 | struct GNUNET_NAMESTORE_RecordData rd[rd_count]; |
126 | struct GNUNET_CRYPTO_EccSignature signature; | 126 | struct GNUNET_CRYPTO_EcdsaSignature signature; |
127 | unsigned int i; | 127 | unsigned int i; |
128 | 128 | ||
129 | GNUNET_snprintf (label, sizeof (label), | 129 | GNUNET_snprintf (label, sizeof (label), |