[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[gnunet] 18/28: RECLAIM: rename G_D_key_covert_... to G_D_key_convert_..
From: |
gnunet |
Subject: |
[gnunet] 18/28: RECLAIM: rename G_D_key_covert_... to G_D_key_convert_... |
Date: |
Mon, 06 Feb 2023 06:19:20 +0100 |
This is an automated email from the git hooks/post-receive script.
martin-schanzenbach pushed a commit to branch master
in repository gnunet.
commit 89dfff6d9b003c13eb6ebfad7be17140cd46a1b4
Author: ulfvonbelow <strilen@tilde.club>
AuthorDate: Sun Jan 29 06:06:47 2023 -0600
RECLAIM: rename G_D_key_covert_... to G_D_key_convert_...
I think this misspelling would tend to distract the reader.
Signed-off-by: Martin Schanzenbach <schanzen@gnunet.org>
---
src/reclaim/did_helper.c | 6 +++---
src/reclaim/did_helper.h | 4 ++--
src/reclaim/test_did_helper.c | 8 ++++----
3 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/src/reclaim/did_helper.c b/src/reclaim/did_helper.c
index 1c04ede33..5600b7440 100644
--- a/src/reclaim/did_helper.c
+++ b/src/reclaim/did_helper.c
@@ -98,7 +98,7 @@ DID_did_to_pkey (const char *did, struct
GNUNET_IDENTITY_PublicKey *pkey)
* @brief Convert a base 64 encoded public key to a GNUNET key
*/
struct GNUNET_IDENTITY_PublicKey *
-GNUNET_DID_key_covert_multibase_base64_to_gnunet (char *pkey_str)
+GNUNET_DID_key_convert_multibase_base64_to_gnunet (char *pkey_str)
{
return NULL;
}
@@ -107,7 +107,7 @@ GNUNET_DID_key_covert_multibase_base64_to_gnunet (char
*pkey_str)
* @brief Convert GNUNET key to a base 64 encoded public key
*/
char *
-DID_key_covert_gnunet_to_multibase_base64 (struct
+DID_key_convert_gnunet_to_multibase_base64 (struct
GNUNET_IDENTITY_PublicKey *
pkey)
{
@@ -154,7 +154,7 @@ DID_pkey_to_did_document (struct GNUNET_IDENTITY_PublicKey
*pkey)
did_str = DID_pkey_to_did (pkey);
GNUNET_asprintf (&verify_id_str, "%s#key-1", did_str);
- pkey_multibase_str = DID_key_covert_gnunet_to_multibase_base64 (pkey);
+ pkey_multibase_str = DID_key_convert_gnunet_to_multibase_base64 (pkey);
didd_json = json_pack (
"{s:[ss], s:s, s:[{s:s, s:s, s:s, s:s}], s:[s], s:[s]}",
diff --git a/src/reclaim/did_helper.h b/src/reclaim/did_helper.h
index 5cad48ca8..fea86af5e 100644
--- a/src/reclaim/did_helper.h
+++ b/src/reclaim/did_helper.h
@@ -52,13 +52,13 @@ DID_did_to_pkey (const char *did, struct
GNUNET_IDENTITY_PublicKey *pkey);
// * @brief Convert a base 64 encoded public key to a GNUNET key
// */
// struct GNUNET_IDENTITY_PublicKey *
-// GNUNET_DID_key_covert_multibase_base64_to_gnunet(char *);
+// GNUNET_DID_key_convert_multibase_base64_to_gnunet(char *);
/**
* @brief Convert GNUNET key to a base 64 encoded public key
*/
char *
-DID_key_covert_gnunet_to_multibase_base64 (struct
+DID_key_convert_gnunet_to_multibase_base64 (struct
GNUNET_IDENTITY_PublicKey *);
/**
diff --git a/src/reclaim/test_did_helper.c b/src/reclaim/test_did_helper.c
index 446c199fc..c7c6f3110 100644
--- a/src/reclaim/test_did_helper.c
+++ b/src/reclaim/test_did_helper.c
@@ -84,13 +84,13 @@ test_GNUNET_DID_did_to_pkey ()
}
// void
-// test_GNUNET_DID_key_covert_multibase_base64_to_gnunet ();
+// test_GNUNET_DID_key_convert_multibase_base64_to_gnunet ();
void
-test_GNUNET_DID_key_covert_gnunet_to_multibase_base64 ()
+test_GNUNET_DID_key_convert_gnunet_to_multibase_base64 ()
{
char *multibase_key;
- multibase_key = DID_key_covert_gnunet_to_multibase_base64 (&test_pkey);
+ multibase_key = DID_key_convert_gnunet_to_multibase_base64 (&test_pkey);
GNUNET_assert (strcmp (test_multibase_key, multibase_key) == 0);
}
@@ -127,6 +127,6 @@ main ()
test_GNUNET_DID_pkey_to_did ();
test_GNUNET_DID_did_to_pkey ();
test_GNUNET_DID_pkey_to_did_document ();
- test_GNUNET_DID_key_covert_gnunet_to_multibase_base64 ();
+ test_GNUNET_DID_key_convert_gnunet_to_multibase_base64 ();
return 0;
}
--
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.
- [gnunet] branch master updated (d8cbbb5b6 -> dc5501061), gnunet, 2023/02/06
- [gnunet] 01/28: -Fix -Wstacl-protector typo., gnunet, 2023/02/06
- [gnunet] 02/28: NAT: don't leak AddrEntries when unregistering., gnunet, 2023/02/06
- [gnunet] 03/28: -Miscellaneous mostly-comment typo fixes., gnunet, 2023/02/06
- [gnunet] 04/28: -CORE: fix memory leak in test., gnunet, 2023/02/06
- [gnunet] 08/28: -GNS: use proper config file name in test_proxy.sh., gnunet, 2023/02/06
- [gnunet] 11/28: HELLO: fix memory leak in GNUNET_HELLO_extract_address., gnunet, 2023/02/06
- [gnunet] 17/28: PEERSTORE: fix write-after-free in handle_{iterate_end,watch_record}, gnunet, 2023/02/06
- [gnunet] 18/28: RECLAIM: rename G_D_key_covert_... to G_D_key_convert_...,
gnunet <=
- [gnunet] 12/28: JSON: fix memory leaks in test., gnunet, 2023/02/06
- [gnunet] 06/28: DHT: remove "memory leak" in gnunet-dht-{get,put}., gnunet, 2023/02/06
- [gnunet] 05/28: -DATACACHE: fix memory leaks in tests., gnunet, 2023/02/06
- [gnunet] 07/28: FS: fix memory leak in GNUNET_FS_search_stop., gnunet, 2023/02/06
- [gnunet] 09/28: GNSRECORD: fix memory leaks in tests., gnunet, 2023/02/06
- [gnunet] 16/28: NAMESTORE: avoid use-after-free in handle_record_result., gnunet, 2023/02/06
- [gnunet] 15/28: NAMESTORE: fix overread in handle_record_store., gnunet, 2023/02/06
- [gnunet] 13/28: -NAMESTORE: fix memory leaks in tests., gnunet, 2023/02/06
- [gnunet] 14/28: NAMESTORE: fix memory leak in parse_recordline., gnunet, 2023/02/06
- [gnunet] 10/28: -HELLO: fix memory leaks in tests., gnunet, 2023/02/06