diff options
author | Christian Grothoff <christian@grothoff.org> | 2023-07-06 00:08:00 +0200 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2023-07-06 00:08:00 +0200 |
commit | c02d88c8e3f55b109063ced037fb8cffb4d5d844 (patch) | |
tree | 2e6d3c065fd36d8ddd4928d1e2b1f4f7f5d6e3ad /src/exchange | |
parent | 11ea6fcfcee3958733309192300760ac5f693251 (diff) |
work on keys serialization/deserialization
Diffstat (limited to 'src/exchange')
-rw-r--r-- | src/exchange/taler-exchange-httpd_keys.c | 30 |
1 files changed, 16 insertions, 14 deletions
diff --git a/src/exchange/taler-exchange-httpd_keys.c b/src/exchange/taler-exchange-httpd_keys.c index 8b9e54b4..bcc7b991 100644 --- a/src/exchange/taler-exchange-httpd_keys.c +++ b/src/exchange/taler-exchange-httpd_keys.c @@ -2223,10 +2223,13 @@ finish_keys_response (struct TEH_KeyStateHandle *ksh) .age_mask = dk->meta.age_mask, }; - memset (&meta.hash, 0, sizeof(meta.hash)); - + memset (&meta.hash, + 0, + sizeof(meta.hash)); /* Search the group/JSON-blob for the key */ - GNUNET_CRYPTO_hash (&meta, sizeof(meta), &key); + GNUNET_CRYPTO_hash (&meta, + sizeof(meta), + &key); group = (struct groupData *) GNUNET_CONTAINER_multihashmap_get ( @@ -2237,7 +2240,7 @@ finish_keys_response (struct TEH_KeyStateHandle *ksh) { /* There is no group for this meta-data yet, so we create a new group */ bool age_restricted = meta.age_mask.bits != 0; - char *cipher; + const char *cipher; group = GNUNET_new (struct groupData); memset (group, 0, sizeof(*group)); @@ -2296,17 +2299,16 @@ finish_keys_response (struct TEH_KeyStateHandle *ksh) { case TALER_DENOMINATION_RSA: key_spec = - GNUNET_JSON_pack_rsa_public_key ("rsa_pub", - dk->denom_pub.details. - rsa_public_key); + GNUNET_JSON_pack_rsa_public_key ( + "rsa_pub", + dk->denom_pub.details.rsa_public_key); break; case TALER_DENOMINATION_CS: key_spec = - GNUNET_JSON_pack_data_varsize ("cs_pub", - &dk->denom_pub.details. - cs_public_key, - sizeof (dk->denom_pub.details. - cs_public_key)); + GNUNET_JSON_pack_data_varsize ( + "cs_pub", + &dk->denom_pub.details.cs_public_key, + sizeof (dk->denom_pub.details.cs_public_key)); break; default: GNUNET_assert (false); @@ -2546,9 +2548,9 @@ build_key_state (struct HelperState *hs, ksh->helpers = hs; } ksh->denomkey_map = GNUNET_CONTAINER_multihashmap_create (1024, - GNUNET_YES); + true); ksh->signkey_map = GNUNET_CONTAINER_multipeermap_create (32, - GNUNET_NO /* MUST be NO! */); + false /* MUST be false! */); ksh->auditors = json_array (); GNUNET_assert (NULL != ksh->auditors); /* NOTE: fetches master-signed signkeys, but ALSO those that were revoked! */ |