diff options
| author | Christian Grothoff <christian@grothoff.org> | 2021-11-17 23:05:14 +0100 | 
|---|---|---|
| committer | Christian Grothoff <christian@grothoff.org> | 2021-11-17 23:05:14 +0100 | 
| commit | fa65f8fd7d81c9e669ea0f54e06cf70301450671 (patch) | |
| tree | 204b8b2cedf8116cef4fefd3d2a30f1abf0a0e86 | |
| parent | b61f601028f38a6c56aa00f171fa20605ca8c663 (diff) | |
migrate test_helper_rsa to latest API
| -rw-r--r-- | src/util/test_helper_rsa.c | 90 | 
1 files changed, 45 insertions, 45 deletions
| diff --git a/src/util/test_helper_rsa.c b/src/util/test_helper_rsa.c index 7d2d3151..c98a678b 100644 --- a/src/util/test_helper_rsa.c +++ b/src/util/test_helper_rsa.c @@ -74,7 +74,7 @@ struct KeyData    /**     * Hash of the public key.     */ -  struct TALER_DenominationHash h_denom_pub; +  struct TALER_RsaPubHashP h_rsa;    /**     * Full public key. @@ -111,7 +111,7 @@ static struct KeyData keys[MAX_KEYS];   *                 zero if the key has been revoked or purged   * @param validity_duration how long does the key remain available for signing;   *                 zero if the key has been revoked or purged - * @param h_denom_pub hash of the @a denom_pub that is available (or was purged) + * @param h_rsa hash of the @a denom_pub that is available (or was purged)   * @param denom_pub the public key itself, NULL if the key was revoked or purged   * @param sm_pub public key of the security module, NULL if the key was revoked or purged   * @param sm_sig signature from the security module, NULL if the key was revoked or purged @@ -122,7 +122,7 @@ key_cb (void *cls,          const char *section_name,          struct GNUNET_TIME_Absolute start_time,          struct GNUNET_TIME_Relative validity_duration, -        const struct TALER_DenominationHash *h_denom_pub, +        const struct TALER_RsaPubHashP *h_rsa,          const struct TALER_DenominationPublicKey *denom_pub,          const struct TALER_SecurityModulePublicKeyP *sm_pub,          const struct TALER_SecurityModuleSignatureP *sm_sig) @@ -131,7 +131,7 @@ key_cb (void *cls,    (void) sm_sig;    GNUNET_log (GNUNET_ERROR_TYPE_INFO,                "Key notification about key %s in `%s'\n", -              GNUNET_h2s (&h_denom_pub->hash), +              GNUNET_h2s (&h_rsa->hash),                section_name);    if (0 == validity_duration.rel_value_us)    { @@ -140,8 +140,8 @@ key_cb (void *cls,      GNUNET_break (NULL == denom_pub);      GNUNET_break (NULL == section_name);      for (unsigned int i = 0; i<MAX_KEYS; i++) -      if (0 == GNUNET_memcmp (h_denom_pub, -                              &keys[i].h_denom_pub)) +      if (0 == GNUNET_memcmp (h_rsa, +                              &keys[i].h_rsa))        {          keys[i].valid = false;          keys[i].revoked = false; @@ -163,7 +163,7 @@ key_cb (void *cls,      if (! keys[i].valid)      {        keys[i].valid = true; -      keys[i].h_denom_pub = *h_denom_pub; +      keys[i].h_rsa = *h_rsa;        keys[i].start_time = start_time;        keys[i].validity_duration = validity_duration;        TALER_denom_pub_deep_copy (&keys[i].denom_pub, @@ -185,7 +185,7 @@ key_cb (void *cls,   * @return 0 on success   */  static int -test_revocation (struct TALER_CRYPTO_DenominationHelper *dh) +test_revocation (struct TALER_CRYPTO_RsaDenominationHelper *dh)  {    struct timespec req = {      .tv_nsec = 250000000 @@ -210,12 +210,12 @@ test_revocation (struct TALER_CRYPTO_DenominationHelper *dh)        keys[j].revoked = true;        fprintf (stderr,                 "Revoking key %s ...", -               GNUNET_h2s (&keys[j].h_denom_pub.hash)); -      TALER_CRYPTO_helper_denom_revoke (dh, -                                        &keys[j].h_denom_pub); +               GNUNET_h2s (&keys[j].h_rsa.hash)); +      TALER_CRYPTO_helper_rsa_revoke (dh, +                                      &keys[j].h_rsa);        for (unsigned int k = 0; k<1000; k++)        { -        TALER_CRYPTO_helper_denom_poll (dh); +        TALER_CRYPTO_helper_rsa_poll (dh);          if (! keys[j].revoked)            break;          nanosleep (&req, NULL); @@ -226,7 +226,7 @@ test_revocation (struct TALER_CRYPTO_DenominationHelper *dh)          fprintf (stderr,                   "\nFAILED: timeout trying to revoke key %u\n",                   j); -        TALER_CRYPTO_helper_denom_disconnect (dh); +        TALER_CRYPTO_helper_rsa_disconnect (dh);          return 2;        }        fprintf (stderr, "\n"); @@ -244,7 +244,7 @@ test_revocation (struct TALER_CRYPTO_DenominationHelper *dh)   * @return 0 on success   */  static int -test_signing (struct TALER_CRYPTO_DenominationHelper *dh) +test_signing (struct TALER_CRYPTO_RsaDenominationHelper *dh)  {    struct TALER_BlindedDenominationSignature ds;    enum TALER_ErrorCode ec; @@ -268,12 +268,12 @@ test_signing (struct TALER_CRYPTO_DenominationHelper *dh)        GNUNET_log (GNUNET_ERROR_TYPE_INFO,                    "Requesting signature over %u bytes with key %s\n",                    (unsigned int) pd.coin_ev_size, -                  GNUNET_h2s (&keys[i].h_denom_pub.hash)); -      ds = TALER_CRYPTO_helper_denom_sign (dh, -                                           &keys[i].h_denom_pub, -                                           pd.coin_ev, -                                           pd.coin_ev_size, -                                           &ec); +                  GNUNET_h2s (&keys[i].h_rsa.hash)); +      ds = TALER_CRYPTO_helper_rsa_sign (dh, +                                         &keys[i].h_rsa, +                                         pd.coin_ev, +                                         pd.coin_ev_size, +                                         &ec);        GNUNET_free (pd.coin_ev);      }      switch (ec) @@ -320,7 +320,7 @@ test_signing (struct TALER_CRYPTO_DenominationHelper *dh)        }        GNUNET_log (GNUNET_ERROR_TYPE_INFO,                    "Received valid signature for key %s\n", -                  GNUNET_h2s (&keys[i].h_denom_pub.hash)); +                  GNUNET_h2s (&keys[i].h_rsa.hash));        success = true;        break;      case TALER_EC_EXCHANGE_DENOMINATION_HELPER_TOO_EARLY: @@ -355,16 +355,16 @@ test_signing (struct TALER_CRYPTO_DenominationHelper *dh)    /* check signing does not work if the key is unknown */    { -    struct TALER_DenominationHash rnd; +    struct TALER_RsaPubHashP rnd;      GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,                                  &rnd,                                  sizeof (rnd)); -    ds = TALER_CRYPTO_helper_denom_sign (dh, -                                         &rnd, -                                         "Hello", -                                         strlen ("Hello"), -                                         &ec); +    ds = TALER_CRYPTO_helper_rsa_sign (dh, +                                       &rnd, +                                       "Hello", +                                       strlen ("Hello"), +                                       &ec);      if (TALER_EC_EXCHANGE_GENERIC_DENOMINATION_KEY_UNKNOWN != ec)      {        if (TALER_EC_NONE == ec) @@ -387,7 +387,7 @@ test_signing (struct TALER_CRYPTO_DenominationHelper *dh)   * @return 0 on success   */  static int -perf_signing (struct TALER_CRYPTO_DenominationHelper *dh, +perf_signing (struct TALER_CRYPTO_RsaDenominationHelper *dh,                const char *type)  {    struct TALER_BlindedDenominationSignature ds; @@ -397,7 +397,7 @@ perf_signing (struct TALER_CRYPTO_DenominationHelper *dh,    TALER_planchet_setup_random (&ps);    duration = GNUNET_TIME_UNIT_ZERO; -  TALER_CRYPTO_helper_denom_poll (dh); +  TALER_CRYPTO_helper_rsa_poll (dh);    for (unsigned int j = 0; j<NUM_SIGN_PERFS;)    {      for (unsigned int i = 0; i<MAX_KEYS; i++) @@ -425,11 +425,11 @@ perf_signing (struct TALER_CRYPTO_DenominationHelper *dh,            struct GNUNET_TIME_Absolute start = GNUNET_TIME_absolute_get ();            struct GNUNET_TIME_Relative delay; -          ds = TALER_CRYPTO_helper_denom_sign (dh, -                                               &keys[i].h_denom_pub, -                                               pd.coin_ev, -                                               pd.coin_ev_size, -                                               &ec); +          ds = TALER_CRYPTO_helper_rsa_sign (dh, +                                             &keys[i].h_rsa, +                                             pd.coin_ev, +                                             pd.coin_ev_size, +                                             &ec);            if (TALER_EC_NONE != ec)              break;            delay = GNUNET_TIME_absolute_get_duration (start); @@ -466,7 +466,7 @@ par_signing (struct GNUNET_CONFIGURATION_Handle *cfg)    struct GNUNET_TIME_Absolute start;    struct GNUNET_TIME_Relative duration;    pid_t pids[NUM_CORES]; -  struct TALER_CRYPTO_DenominationHelper *dh; +  struct TALER_CRYPTO_RsaDenominationHelper *dh;    start = GNUNET_TIME_absolute_get ();    for (unsigned int i = 0; i<NUM_CORES; i++) @@ -481,13 +481,13 @@ par_signing (struct GNUNET_CONFIGURATION_Handle *cfg)      {        int ret; -      dh = TALER_CRYPTO_helper_denom_connect (cfg, -                                              &key_cb, -                                              NULL); +      dh = TALER_CRYPTO_helper_rsa_connect (cfg, +                                            &key_cb, +                                            NULL);        GNUNET_assert (NULL != dh);        ret = perf_signing (dh,                            "parallel"); -      TALER_CRYPTO_helper_denom_disconnect (dh); +      TALER_CRYPTO_helper_rsa_disconnect (dh);        exit (ret);      }    } @@ -517,7 +517,7 @@ static int  run_test (void)  {    struct GNUNET_CONFIGURATION_Handle *cfg; -  struct TALER_CRYPTO_DenominationHelper *dh; +  struct TALER_CRYPTO_RsaDenominationHelper *dh;    struct timespec req = {      .tv_nsec = 250000000    }; @@ -537,9 +537,9 @@ run_test (void)    {      nanosleep (&req,                 NULL); -    dh = TALER_CRYPTO_helper_denom_connect (cfg, -                                            &key_cb, -                                            NULL); +    dh = TALER_CRYPTO_helper_rsa_connect (cfg, +                                          &key_cb, +                                          NULL);      if (NULL != dh)        break;      fprintf (stderr, "."); @@ -555,7 +555,7 @@ run_test (void)    {      fprintf (stderr,               "\nFAILED: timeout trying to connect to helper\n"); -    TALER_CRYPTO_helper_denom_disconnect (dh); +    TALER_CRYPTO_helper_rsa_disconnect (dh);      GNUNET_CONFIGURATION_destroy (cfg);      return 1;    } @@ -570,7 +570,7 @@ run_test (void)    if (0 == ret)      ret = perf_signing (dh,                          "sequential"); -  TALER_CRYPTO_helper_denom_disconnect (dh); +  TALER_CRYPTO_helper_rsa_disconnect (dh);    if (0 == ret)      ret = par_signing (cfg);    /* clean up our state */ | 
