gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-donau] branch master updated: [donau] some deletions


From: gnunet
Subject: [taler-donau] branch master updated: [donau] some deletions
Date: Tue, 02 Jan 2024 12:26:12 +0100

This is an automated email from the git hooks/post-receive script.

lukas-matyja pushed a commit to branch master
in repository donau.

The following commit(s) were added to refs/heads/master by this push:
     new a496633  [donau] some deletions
a496633 is described below

commit a49663396b12c82342891edc3012550df40a2d84
Author: Matyja Lukas Adam <lukas.matyja@students.bfh.ch>
AuthorDate: Tue Jan 2 12:25:05 2024 +0100

    [donau] some deletions
---
 src/donau-tools/donau-dbinit.c | 165 +++++++++++++--------------
 src/donau/donau-httpd.c        |  32 +++---
 src/donau/donau-httpd_keys.c   | 247 +++++++----------------------------------
 3 files changed, 137 insertions(+), 307 deletions(-)

diff --git a/src/donau-tools/donau-dbinit.c b/src/donau-tools/donau-dbinit.c
index 6f81404..1978661 100644
--- a/src/donau-tools/donau-dbinit.c
+++ b/src/donau-tools/donau-dbinit.c
@@ -22,6 +22,7 @@
 #include "taler/platform.h"
 #include <gnunet/gnunet_util_lib.h>
 #include "donaudb_lib.h"
+#include "donau_util.h"
 
 
 /**
@@ -62,80 +63,80 @@ static int force_create_partitions;
  * @param cfgfile name of the configuration file used (for saving, can be 
NULL!)
  * @param cfg configuration
  */
-// static void
-// run (void *cls,
-//      char *const *args,
-//      const char *cfgfile,
-//      const struct GNUNET_CONFIGURATION_Handle *cfg)
-// {
-//   struct DONAUDB_Plugin *plugin;
-
-//   (void) cls;
-//   (void) args;
-//   (void) cfgfile;
-
-//   if (NULL ==
-//       (plugin = DONAUDB_plugin_load (cfg)))
-//   {
-//     fprintf (stderr,
-//              "Failed to initialize database plugin.\n");
-//     global_ret = EXIT_NOTINSTALLED;
-//     return;
-//   }
-//   if (reset_db)
-//   {
-//     if (GNUNET_OK !=
-//         plugin->drop_tables (plugin->cls))
-//     {
-//       GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
-//                   "Could not drop tables as requested. Either database was 
not yet initialized, or permission denied. Consult the logs. Will still try to 
create new tables.\n");
-//     }
-//   }
-//   if (GNUNET_OK !=
-//       plugin->create_tables (plugin->cls,
-//                              force_create_partitions || num_partitions > 0,
-//                              num_partitions))
-//   {
-//     fprintf (stderr,
-//              "Failed to initialize database.\n");
-//     DONAUDB_plugin_unload (plugin);
-//     plugin = NULL;
-//     global_ret = EXIT_NOPERMISSION;
-//     return;
-//   }
-//   if (gc_db || clear_shards)
-//   {
-//     if (GNUNET_OK !=
-//         plugin->preflight (plugin->cls))
-//     {
-//       fprintf (stderr,
-//                "Failed to prepare database.\n");
-//       DONAUDB_plugin_unload (plugin);
-//       plugin = NULL;
-//       global_ret = EXIT_NOPERMISSION;
-//       return;
-//     }
-//     if (clear_shards)
-//     {
-//       if (GNUNET_OK !=
-//           plugin->delete_shard_locks (plugin->cls))
-//       {
-//         fprintf (stderr,
-//                  "Clearing revolving shards failed!\n");
-//       }
-//     }
-//     if (gc_db)
-//     {
-//       if (GNUNET_SYSERR == plugin->gc (plugin->cls))
-//       {
-//         fprintf (stderr,
-//                  "Garbage collection failed!\n");
-//       }
-//     }
-//   }
-//   DONAUDB_plugin_unload (plugin);
-//   plugin = NULL;
-// }
+static void
+run (void *cls,
+     char *const *args,
+     const char *cfgfile,
+     const struct GNUNET_CONFIGURATION_Handle *cfg)
+{
+  struct DONAUDB_Plugin *plugin;
+
+  (void) cls;
+  (void) args;
+  (void) cfgfile;
+
+  if (NULL ==
+      (plugin = DONAUDB_plugin_load (cfg)))
+  {
+    fprintf (stderr,
+             "Failed to initialize database plugin.\n");
+    global_ret = EXIT_NOTINSTALLED;
+    return;
+  }
+  if (reset_db)
+  {
+    if (GNUNET_OK !=
+        plugin->drop_tables (plugin->cls))
+    {
+      GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
+                  "Could not drop tables as requested. Either database was not 
yet initialized, or permission denied. Consult the logs. Will still try to 
create new tables.\n");
+    }
+  }
+  if (GNUNET_OK !=
+      plugin->create_tables (plugin->cls,
+                             force_create_partitions || num_partitions > 0,
+                             num_partitions))
+  {
+    fprintf (stderr,
+             "Failed to initialize database.\n");
+    DONAUDB_plugin_unload (plugin);
+    plugin = NULL;
+    global_ret = EXIT_NOPERMISSION;
+    return;
+  }
+  if (gc_db || clear_shards)
+  {
+    if (GNUNET_OK !=
+        plugin->preflight (plugin->cls))
+    {
+      fprintf (stderr,
+               "Failed to prepare database.\n");
+      DONAUDB_plugin_unload (plugin);
+      plugin = NULL;
+      global_ret = EXIT_NOPERMISSION;
+      return;
+    }
+    if (clear_shards)
+    {
+      if (GNUNET_OK !=
+          plugin->delete_shard_locks (plugin->cls))
+      {
+        fprintf (stderr,
+                 "Clearing revolving shards failed!\n");
+      }
+    }
+    if (gc_db)
+    {
+      if (GNUNET_SYSERR == plugin->gc (plugin->cls))
+      {
+        fprintf (stderr,
+                 "Garbage collection failed!\n");
+      }
+    }
+  }
+  DONAUDB_plugin_unload (plugin);
+  plugin = NULL;
+}
 
 
 /**
@@ -182,14 +183,14 @@ main (int argc,
     return EXIT_INVALIDARGUMENT;
   /* force linker to link against libtalerutil; if we do
      not do this, the linker may "optimize" libtalerutil
-     away and skip #TALER_OS_init(), which we do need */
-  // TALER_OS_init ();
-  // ret = GNUNET_PROGRAM_run (
-  //   argc, argv,
-  //   "taler-donau-dbinit",
-  //   gettext_noop ("Initialize Taler donau database"),
-  //   options,
-  //   &run, NULL);
+     away and skip #DONAU_OS_init(), which we do need */
+  DONAU_OS_init ();
+  ret = GNUNET_PROGRAM_run (
+    argc, argv,
+    "donau-dbinit",
+    gettext_noop ("Initialize Donau database"),
+    options,
+    &run, NULL);
   GNUNET_free_nz ((void *) argv);
   if (GNUNET_SYSERR == ret)
     return EXIT_INVALIDARGUMENT;
diff --git a/src/donau/donau-httpd.c b/src/donau/donau-httpd.c
index a1624b9..cb4d875 100644
--- a/src/donau/donau-httpd.c
+++ b/src/donau/donau-httpd.c
@@ -1009,22 +1009,22 @@ donau_serve_process_config (void)
   //   GNUNET_free (attr_enc_key_str);
   // }
 
-  for (unsigned int i = 0; i<MAX_DB_RETRIES; i++)
-  {
-    DH_plugin = DONAUDB_plugin_load (DH_cfg);
-    if (NULL != DH_plugin)
-      break;
-    GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
-                "Failed to connect to DB, will try again %u times\n",
-                MAX_DB_RETRIES - i);
-    sleep (1);
-  }
-  if (NULL == DH_plugin)
-  {
-    GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
-                "Failed to initialize DB subsystem. Giving up.\n");
-    return GNUNET_SYSERR;
-  }
+  // for (unsigned int i = 0; i<MAX_DB_RETRIES; i++)
+  // {
+  //   DH_plugin = DONAUDB_plugin_load (DH_cfg);
+  //   if (NULL != DH_plugin)
+  //     break;
+  //   GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
+  //               "Failed to connect to DB, will try again %u times\n",
+  //               MAX_DB_RETRIES - i);
+  //   sleep (1);
+  // }
+  // if (NULL == DH_plugin)
+  // {
+  //   GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
+  //               "Failed to initialize DB subsystem. Giving up.\n");
+  //   return GNUNET_SYSERR;
+  // }
   return GNUNET_OK;
 }
 
diff --git a/src/donau/donau-httpd_keys.c b/src/donau/donau-httpd_keys.c
index c2f04f7..a3b6573 100644
--- a/src/donau/donau-httpd_keys.c
+++ b/src/donau/donau-httpd_keys.c
@@ -45,7 +45,7 @@
 /**
  * Information about a denomination on offer by the denomination helper.
  */
-struct HelperDenomination
+struct HelperDonationUnit
 {
 
   // maybe change to year unsigned int later -> many associated changes
@@ -70,7 +70,7 @@ struct HelperDenomination
   /**
    * Signature over this key from the security module's key.
    */
-  struct TALER_SecurityModuleSignatureP sm_sig; // when to use the module key 
and when the master key?
+  struct TALER_SecurityModuleSignatureP sm_sig;
 
   /**
    * The (full) public key.
@@ -157,17 +157,17 @@ struct HelperState
   struct TALER_CRYPTO_CsDenominationHelper *csdh;
 
   /**
-   * Map from H(denom_pub) to `struct HelperDenomination` entries.
+   * Map from H(denom_pub) to `struct HelperDonationUnit` entries.
    */
   struct GNUNET_CONTAINER_MultiHashMap *denom_keys;
 
   /**
-   * Map from H(rsa_pub) to `struct HelperDenomination` entries.
+   * Map from H(rsa_pub) to `struct HelperDonationUnit` entries.
    */
   struct GNUNET_CONTAINER_MultiHashMap *rsa_keys;
 
   /**
-   * Map from H(cs_pub) to `struct HelperDenomination` entries.
+   * Map from H(cs_pub) to `struct HelperDonationUnit` entries.
    */
   struct GNUNET_CONTAINER_MultiHashMap *cs_keys;
 
@@ -176,7 +176,7 @@ struct HelperState
    * entries.  Based on the fact that a `struct GNUNET_PeerIdentity` is also
    * an EdDSA public key.
    */
-  struct GNUNET_CONTAINER_MultiPeerMap *esign_keys; //abuse fall hash für 
public keys, key integer, key hash, key public key
+  struct GNUNET_CONTAINER_MultiPeerMap *esign_keys;
 
 };
 
@@ -492,7 +492,7 @@ suspend_request (struct MHD_Connection *connection)
  *
  * @param cls NULL
  * @param hc denomination hash (unused)
- * @param value a `struct DH_DenominationKey`
+ * @param value a `struct DH_DonationUnitKey`
  * @return #GNUNET_OK
  */
 static enum GNUNET_GenericReturnValue
@@ -500,7 +500,7 @@ check_dk (void *cls,
           const struct GNUNET_HashCode *hc,
           void *value)
 {
-  struct DH_DenominationKey *dk = value;
+  struct DH_DonationUnitKey *dk = value;
 
   (void) cls;
   (void) hc;
@@ -647,9 +647,9 @@ check_esign_sm_pub (const struct 
TALER_SecurityModulePublicKeyP *sm_pub)
  * Helper function for #destroy_key_helpers to free all entries
  * in the `denom_keys` map.
  *
- * @param cls the `struct HelperDenomination`
+ * @param cls the `struct HelperDonationUnit`
  * @param h_denom_pub hash of the denomination public key
- * @param value the `struct HelperDenomination` to release
+ * @param value the `struct HelperDonationUnit` to release
  * @return #GNUNET_OK (continue to iterate)
  */
 static enum GNUNET_GenericReturnValue
@@ -657,7 +657,7 @@ free_denom_cb (void *cls,
                const struct GNUNET_HashCode *h_denom_pub,
                void *value)
 {
-  struct HelperDenomination *hd = value;
+  struct HelperDonationUnit *hd = value;
 
   (void) cls;
   (void) h_denom_pub;
@@ -807,7 +807,7 @@ helper_rsa_cb (
   const struct TALER_SecurityModuleSignatureP *sm_sig)
 {
   struct HelperState *hs = cls;
-  struct HelperDenomination *hd;
+  struct HelperDonationUnit *hd;
 
   GNUNET_log (GNUNET_ERROR_TYPE_INFO,
               "RSA helper announces key %s for denomination type %s with 
validity %s\n",
@@ -827,7 +827,7 @@ helper_rsa_cb (
   }
   GNUNET_assert (NULL != sm_pub);
   check_denom_rsa_sm_pub (sm_pub);
-  hd = GNUNET_new (struct HelperDenomination);
+  hd = GNUNET_new (struct HelperDonationUnit);
   hd->start_time = start_time;
   hd->validity_duration = validity_duration;
   hd->h_details.h_rsa = *h_rsa;
@@ -888,7 +888,7 @@ helper_cs_cb (
   const struct TALER_SecurityModuleSignatureP *sm_sig)
 {
   struct HelperState *hs = cls;
-  struct HelperDenomination *hd;
+  struct HelperDonationUnit *hd;
 
   GNUNET_log (GNUNET_ERROR_TYPE_INFO,
               "CS helper announces key %s for denomination type %s with 
validity %s\n",
@@ -908,7 +908,7 @@ helper_cs_cb (
   }
   GNUNET_assert (NULL != sm_pub);
   check_denom_cs_sm_pub (sm_pub);
-  hd = GNUNET_new (struct HelperDenomination);
+  hd = GNUNET_new (struct HelperDonationUnit);
   hd->start_time = start_time;
   hd->validity_duration = validity_duration;
   hd->h_details.h_cs = *h_cs;
@@ -1067,15 +1067,15 @@ sync_key_helpers (struct HelperState *hs)
  *
  * @param cls a `struct DH_KeyStateHandle`, unused
  * @param h_denom_pub hash of the denomination public key, unused
- * @param value a `struct DH_DenominationKey` to free
+ * @param value a `struct DH_DonationUnitKey` to free
  * @return #GNUNET_OK (continue to iterate)
  */
 static enum GNUNET_GenericReturnValue
-clear_denomination_cb (void *cls,
+clear_donation_unit_cb (void *cls,
                        const struct GNUNET_HashCode *h_denom_pub,
                        void *value)
 {
-  struct DH_DenominationKey *dk = value;
+  struct DH_DonationUnitKey *dk = value;
   struct DH_AuditorSignature *as;
 
   (void) cls;
@@ -1249,37 +1249,16 @@ DH_keys_finished ()
  * @param denom_pub public key of the denomination
  * @param h_denom_pub hash of @a denom_pub
  * @param meta meta data information about the denomination type (value, year)
- * @param master_sig master signature affirming the validity of this 
denomination
- * @param recoup_possible true if the key was revoked and clients can 
currently recoup
- *        coins of this denomination
  */
 static void
 denomination_info_cb (
   void *cls,
   const struct TALER_DenominationPublicKey *denom_pub,
   const struct TALER_DenominationHashP *h_denom_pub,
-  const struct DONAUDB_DenominationKeyMetaData *meta,
-  const struct TALER_MasterSignatureP *master_sig,
-  bool recoup_possible)
+  const struct DONAUDB_DonationUnitKeyMetaData *meta)
 {
   struct DH_KeyStateHandle *ksh = cls;
-  struct DH_DenominationKey *dk;
-
-  if (GNUNET_OK !=
-      TALER_donau_offline_denom_validity_verify (
-        h_denom_pub,
-        meta->start,
-        meta->expire_withdraw,
-        meta->expire_deposit,
-        meta->expire_legal,
-        &meta->value,
-        &DH_master_public_key,
-        master_sig))
-  {
-    GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
-                "Database has denomination with invalid signature. Skipping 
entry. Did the donau offline public key change?\n");
-    return;
-  }
+  struct DH_DonationUnitKey *dk;
 
   GNUNET_assert (TALER_DENOMINATION_INVALID != denom_pub->cipher);
   if (GNUNET_TIME_absolute_is_zero (meta->start.abs_time) ||
@@ -1292,13 +1271,11 @@ denomination_info_cb (
                 GNUNET_h2s (&h_denom_pub->hash));
     return;
   }
-  dk = GNUNET_new (struct DH_DenominationKey);
+  dk = GNUNET_new (struct DH_DonationUnitKey);
   TALER_denom_pub_deep_copy (&dk->denom_pub,
                              denom_pub);
   dk->h_denom_pub = *h_denom_pub;
   dk->meta = *meta;
-  dk->master_sig = *master_sig;
-  dk->recoup_possible = recoup_possible;
   dk->denom_pub.age_mask = meta->age_mask;
 
   GNUNET_assert (
@@ -1322,30 +1299,15 @@ static void
 signkey_info_cb (
   void *cls,
   const struct DONAU_DonauPublicKeyP *donau_pub,
-  const struct DONAUDB_SignkeyMetaData *meta,
-  const struct TALER_MasterSignatureP *master_sig)
+  const struct DONAUDB_SignkeyMetaData *meta)
 {
   struct DH_KeyStateHandle *ksh = cls;
   struct SigningKey *sk;
   struct GNUNET_PeerIdentity pid;
 
-  if (GNUNET_OK !=
-      TALER_donau_offline_signkey_validity_verify (
-        donau_pub,
-        meta->start,
-        meta->expire_sign,
-        meta->expire_legal,
-        &DH_master_public_key,
-        master_sig))
-  {
-    GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
-                "Database has signing key with invalid signature. Skipping 
entry. Did the donau offline public key change?\n");
-    return;
-  }
   sk = GNUNET_new (struct SigningKey);
   sk->donau_pub = *donau_pub;
   sk->meta = *meta;
-  sk->master_sig = *master_sig;
   pid.public_key = donau_pub->eddsa_pub;
   GNUNET_assert (
     GNUNET_OK ==
@@ -1356,139 +1318,6 @@ signkey_info_cb (
 }
 
 
-/**
- * Closure for #get_auditor_sigs.
- */
-struct GetAuditorSigsContext
-{
-  /**
-   * Where to store the matching signatures.
-   */
-  json_t *denom_keys;
-
-  /**
-   * Public key of the auditor to match against.
-   */
-  const struct TALER_AuditorPublicKeyP *auditor_pub;
-};
-
-
-/**
- * Extract the auditor signatures matching the auditor's public
- * key from the @a value and generate the respective JSON.
- *
- * @param cls a `struct GetAuditorSigsContext`
- * @param h_denom_pub hash of the denomination public key
- * @param value a `struct DH_DenominationKey`
- * @return #GNUNET_OK (continue to iterate)
- */
-static enum GNUNET_GenericReturnValue
-get_auditor_sigs (void *cls,
-                  const struct GNUNET_HashCode *h_denom_pub,
-                  void *value)
-{
-  struct GetAuditorSigsContext *ctx = cls;
-  struct DH_DenominationKey *dk = value;
-
-  for (struct DH_AuditorSignature *as = dk->as_head;
-       NULL != as;
-       as = as->next)
-  {
-    if (0 !=
-        GNUNET_memcmp (ctx->auditor_pub,
-                       &as->apub))
-      continue;
-    GNUNET_break (0 ==
-                  json_array_append_new (
-                    ctx->denom_keys,
-                    GNUNET_JSON_PACK (
-                      GNUNET_JSON_pack_data_auto ("denom_pub_h",
-                                                  h_denom_pub),
-                      GNUNET_JSON_pack_data_auto ("auditor_sig",
-                                                  &as->asig))));
-  }
-  return GNUNET_OK;
-}
-
-
-/**
- * Function called with information about the donau's auditors.
- *
- * @param cls closure with a `struct DH_KeyStateHandle *`
- * @param auditor_pub the public key of the auditor
- * @param auditor_url URL of the REST API of the auditor
- * @param auditor_name human readable official name of the auditor
- */
-static void
-auditor_info_cb (
-  void *cls,
-  const struct TALER_AuditorPublicKeyP *auditor_pub,
-  const char *auditor_url,
-  const char *auditor_name)
-{
-  struct DH_KeyStateHandle *ksh = cls;
-  struct GetAuditorSigsContext ctx;
-
-  ctx.denom_keys = json_array ();
-  GNUNET_assert (NULL != ctx.denom_keys);
-  ctx.auditor_pub = auditor_pub;
-  GNUNET_CONTAINER_multihashmap_iterate (ksh->denomkey_map,
-                                         &get_auditor_sigs,
-                                         &ctx);
-  GNUNET_break (0 ==
-                json_array_append_new (
-                  ksh->auditors,
-                  GNUNET_JSON_PACK (
-                    GNUNET_JSON_pack_string ("auditor_name",
-                                             auditor_name),
-                    GNUNET_JSON_pack_data_auto ("auditor_pub",
-                                                auditor_pub),
-                    GNUNET_JSON_pack_string ("auditor_url",
-                                             auditor_url),
-                    GNUNET_JSON_pack_array_steal ("denomination_keys",
-                                                  ctx.denom_keys))));
-}
-
-
-/**
- * Function called with information about the denominations
- * audited by the donau's auditors.
- *
- * @param cls closure with a `struct DH_KeyStateHandle *`
- * @param auditor_pub the public key of an auditor
- * @param h_denom_pub hash of a denomination key audited by this auditor
- * @param auditor_sig signature from the auditor affirming this
- */
-static void
-auditor_denom_cb (
-  void *cls,
-  const struct TALER_AuditorPublicKeyP *auditor_pub,
-  const struct TALER_DenominationHashP *h_denom_pub,
-  const struct TALER_AuditorSignatureP *auditor_sig)
-{
-  struct DH_KeyStateHandle *ksh = cls;
-  struct DH_DenominationKey *dk;
-  struct DH_AuditorSignature *as;
-
-  dk = GNUNET_CONTAINER_multihashmap_get (ksh->denomkey_map,
-                                          &h_denom_pub->hash);
-  if (NULL == dk)
-  {
-    /* Odd, this should be impossible as per foreign key
-       constraint on 'auditor_denom_sigs'! Well, we can
-       safely continue anyway, so let's just log it. */
-    GNUNET_break (0);
-    return;
-  }
-  as = GNUNET_new (struct DH_AuditorSignature);
-  as->asig = *auditor_sig;
-  as->apub = *auditor_pub;
-  GNUNET_CONTAINER_DLL_insert (dk->as_head,
-                               dk->as_tail,
-                               as);
-}
-
-
 /**
  * Closure for #add_sign_key_cb.
  */
@@ -1581,7 +1410,7 @@ struct DenomKeyCtx
  *
  * @param cls a `struct DenomKeyCtx`
  * @param h_denom_pub hash of the denomination key
- * @param value a `struct DH_DenominationKey`
+ * @param value a `struct DH_DonationUnitKey`
  * @return #GNUNET_OK (continue to iterate)
  */
 static enum GNUNET_GenericReturnValue
@@ -1590,7 +1419,7 @@ add_denom_key_cb (void *cls,
                   void *value)
 {
   struct DenomKeyCtx *dkc = cls;
-  struct DH_DenominationKey *dk = value;
+  struct DH_DonationUnitKey *dk = value;
 
   if (dk->recoup_possible)
   {
@@ -2010,7 +1839,7 @@ finish_keys_response (struct DH_KeyStateHandle *ksh)
   // "denom_pubs" array along with the new grouped "denominations".
   // "denom_pubs" Will be removed sooner or later.
   {
-    struct DH_DenominationKey *dk;
+    struct DH_DonationUnitKey *dk;
     struct GNUNET_CONTAINER_MultiHashMap *denominations_by_group;
     /* GroupData is the value we store for each group meta-data */
     struct GroupData
@@ -2153,7 +1982,7 @@ finish_keys_response (struct DH_KeyStateHandle *ksh)
         /* Now that we have found/created the right group, add the
            denomination to the list */
         {
-          struct HelperDenomination *hd;
+          struct HelperDonationUnit *hd;
           struct GNUNET_JSON_PackSpec key_spec;
           bool private_key_lost;
 
@@ -2515,7 +2344,7 @@ DH_keys_get_state (void)
 }
 
 
-struct DH_DenominationKey *
+struct DH_DonationUnitKey *
 DH_keys_denomination_by_hash (
   const struct TALER_DenominationHashP *h_denom_pub,
   struct MHD_Connection *conn,
@@ -2540,14 +2369,14 @@ DH_keys_denomination_by_hash (
 }
 
 
-struct DH_DenominationKey *
+struct DH_DonationUnitKey *
 DH_keys_denomination_by_hash_from_state (
   const struct DH_KeyStateHandle *ksh,
   const struct TALER_DenominationHashP *h_denom_pub,
   struct MHD_Connection *conn,
   MHD_RESULT *mret)
 {
-  struct DH_DenominationKey *dk;
+  struct DH_DonationUnitKey *dk;
 
   dk = GNUNET_CONTAINER_multihashmap_get (ksh->denomkey_map,
                                           &h_denom_pub->hash);
@@ -2570,7 +2399,7 @@ DH_keys_denomination_sign (
   struct TALER_BlindedDenominationSignature *bs)
 {
   struct DH_KeyStateHandle *ksh;
-  struct HelperDenomination *hd;
+  struct HelperDonationUnit *hd;
   const struct TALER_DenominationHashP *h_denom_pub = csd->h_denom_pub;
   const struct TALER_BlindedPlanchet *bp = csd->bp;
 
@@ -2626,7 +2455,7 @@ DH_keys_donation_unit_batch_sign (
   struct TALER_BlindedDenominationSignature *bss)
 {
   struct DH_KeyStateHandle *ksh;
-  struct HelperDenomination *hd;
+  struct HelperDonationUnit *hd;
   struct TALER_CRYPTO_RsaSignRequest rsrs[csds_length];
   struct TALER_CRYPTO_CsSignRequest csrs[csds_length];
   struct TALER_BlindedDenominationSignature rs[csds_length];
@@ -2749,7 +2578,7 @@ DH_keys_denomination_cs_r_pub (
   const struct TALER_DenominationHashP *h_denom_pub = cdd->h_denom_pub;
   const struct TALER_CsNonce *nonce = cdd->nonce;
   struct DH_KeyStateHandle *ksh;
-  struct HelperDenomination *hd;
+  struct HelperDonationUnit *hd;
 
   ksh = DH_keys_get_state ();
   if (NULL == ksh)
@@ -2788,7 +2617,7 @@ DH_keys_denomination_cs_batch_r_pub (
   struct TALER_DenominationCSPublicRPairP *r_pubs)
 {
   struct DH_KeyStateHandle *ksh;
-  struct HelperDenomination *hd;
+  struct HelperDonationUnit *hd;
   struct TALER_CRYPTO_CsDeriveRequest cdrs[cdds_length];
 
   ksh = DH_keys_get_state ();
@@ -2827,7 +2656,7 @@ void
 DH_keys_denomination_revoke (const struct TALER_DenominationHashP *h_denom_pub)
 {
   struct DH_KeyStateHandle *ksh;
-  struct HelperDenomination *hd;
+  struct HelperDonationUnit *hd;
 
   ksh = DH_keys_get_state ();
   if (NULL == ksh)
@@ -3133,7 +2962,7 @@ struct FutureBuilderContext
  *
  * @param cls the `struct FutureBuilderContext *`
  * @param h_denom_pub hash of the denomination public key
- * @param value a `struct HelperDenomination`
+ * @param value a `struct HelperDonationUnit`
  * @return #GNUNET_OK (continue to iterate)
  */
 static enum GNUNET_GenericReturnValue
@@ -3142,8 +2971,8 @@ add_future_denomkey_cb (void *cls,
                         void *value)
 {
   struct FutureBuilderContext *fbc = cls;
-  struct HelperDenomination *hd = value;
-  struct DH_DenominationKey *dk;
+  struct HelperDonationUnit *hd = value;
+  struct DH_DonationUnitKey *dk;
   struct DONAUDB_DenominationKeyMetaData meta = {0};
 
   dk = GNUNET_CONTAINER_multihashmap_get (fbc->ksh->denomkey_map,
@@ -3189,7 +3018,7 @@ add_future_denomkey_cb (void *cls,
  *
  * @param cls the `struct FutureBuilderContext *`
  * @param pid actually the donau public key (type disguised)
- * @param value a `struct HelperDenomination`
+ * @param value a `struct HelperDonationUnit`
  * @return #GNUNET_OK (continue to iterate)
  */
 static enum GNUNET_GenericReturnValue

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]