[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] Remove DER64 functions in trunk: they will never be used ag...
Update of /home/or/cvsroot/tor/src/or
In directory moria:/tmp/cvs-serv7560/src/or
Modified Files:
routerparse.c test.c
Log Message:
Remove DER64 functions in trunk: they will never be used again unless the directory authorities switch back to 0.0.9tooearly.
Index: routerparse.c
===================================================================
RCS file: /home/or/cvsroot/tor/src/or/routerparse.c,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -p -d -r1.183 -r1.184
--- routerparse.c 10 Apr 2006 07:50:38 -0000 1.183
+++ routerparse.c 10 Apr 2006 21:22:59 -0000 1.184
@@ -540,14 +540,6 @@ find_dir_signing_key(const char *str)
if (tok->key) {
key = tok->key;
tok->key = NULL; /* steal reference. */
- } else if (tok->n_args >= 1) {
- /** XXXX Once all the directories are running 0.1.0.6-rc or later, we
- * can remove this logic. */
- key = crypto_pk_DER64_decode_public_key(tok->args[0]);
- if (!key) {
- log_warn(LD_DIR, "Unparseable dir-signing-key argument");
- return NULL;
- }
} else {
log_warn(LD_DIR, "Dir-signing-key token contained no key");
return NULL;
Index: test.c
===================================================================
RCS file: /home/or/cvsroot/tor/src/or/test.c,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -p -d -r1.224 -r1.225
--- test.c 27 Mar 2006 02:25:34 -0000 1.224
+++ test.c 10 Apr 2006 21:23:00 -0000 1.225
@@ -416,19 +416,6 @@ test_crypto(void)
test_eq(0, crypto_pk_cmp_keys(pk1, pk2));
tor_free(cp);
- /* Check DER encoding */
- i=crypto_pk_DER64_encode_public_key(pk1, &cp);
- test_assert(i>0);
- test_assert(cp);
- test_assert(!strchr(cp, ' '));
- test_assert(!strchr(cp, '\n'));
- test_eq(0, crypto_pk_cmp_keys(pk1, pk1));
- crypto_free_pk_env(pk2);
- pk2 = crypto_pk_DER64_decode_public_key(cp);
- test_assert(pk2);
- test_eq(0, crypto_pk_cmp_keys(pk1, pk2));
- tor_free(cp);
-
test_eq(128, crypto_pk_keysize(pk1));
test_eq(128, crypto_pk_keysize(pk2));