gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] r36945 - in gnunet/src: include json pq util


From: gnunet
Subject: [GNUnet-SVN] r36945 - in gnunet/src: include json pq util
Date: Mon, 21 Mar 2016 14:41:12 +0100

Author: grothoff
Date: 2016-03-21 14:41:12 +0100 (Mon, 21 Mar 2016)
New Revision: 36945

Modified:
   gnunet/src/include/gnunet_crypto_lib.h
   gnunet/src/include/gnunet_json_lib.h
   gnunet/src/include/gnunet_pq_lib.h
   gnunet/src/json/json_generator.c
   gnunet/src/json/json_helper.c
   gnunet/src/json/test_json.c
   gnunet/src/pq/pq_query_helper.c
   gnunet/src/pq/pq_result_helper.c
   gnunet/src/pq/test_pq.c
   gnunet/src/util/crypto_rsa.c
   gnunet/src/util/perf_crypto_rsa.c
   gnunet/src/util/test_crypto_rsa.c
Log:
fixing symbol naming and coding convention issues

Modified: gnunet/src/include/gnunet_crypto_lib.h
===================================================================
--- gnunet/src/include/gnunet_crypto_lib.h      2016-03-20 14:44:36 UTC (rev 
36944)
+++ gnunet/src/include/gnunet_crypto_lib.h      2016-03-21 13:41:12 UTC (rev 
36945)
@@ -1779,12 +1779,12 @@
 /**
  * The private information of an RSA key pair.
  */
-struct GNUNET_CRYPTO_rsa_PrivateKey;
+struct GNUNET_CRYPTO_RsaPrivateKey;
 
 /**
  * The public information of an RSA key pair.
  */
-struct GNUNET_CRYPTO_rsa_PublicKey;
+struct GNUNET_CRYPTO_RsaPublicKey;
 
 /**
  * Key used to blind a message
@@ -1794,7 +1794,7 @@
 /**
  * @brief an RSA signature
  */
-struct GNUNET_CRYPTO_rsa_Signature;
+struct GNUNET_CRYPTO_RsaSignature;
 
 
 /**
@@ -1803,7 +1803,7 @@
  * @param len length of the key in bits (i.e. 2048)
  * @return fresh private key
  */
-struct GNUNET_CRYPTO_rsa_PrivateKey *
+struct GNUNET_CRYPTO_RsaPrivateKey *
 GNUNET_CRYPTO_rsa_private_key_create (unsigned int len);
 
 
@@ -1813,7 +1813,7 @@
  * @param key pointer to the memory to free
  */
 void
-GNUNET_CRYPTO_rsa_private_key_free (struct GNUNET_CRYPTO_rsa_PrivateKey *key);
+GNUNET_CRYPTO_rsa_private_key_free (struct GNUNET_CRYPTO_RsaPrivateKey *key);
 
 
 /**
@@ -1825,7 +1825,7 @@
  * @return size of memory allocatedin @a buffer
  */
 size_t
-GNUNET_CRYPTO_rsa_private_key_encode (const struct 
GNUNET_CRYPTO_rsa_PrivateKey *key,
+GNUNET_CRYPTO_rsa_private_key_encode (const struct GNUNET_CRYPTO_RsaPrivateKey 
*key,
                                      char **buffer);
 
 
@@ -1837,7 +1837,7 @@
  * @param len the length of the data in @a buf
  * @return NULL on error
  */
-struct GNUNET_CRYPTO_rsa_PrivateKey *
+struct GNUNET_CRYPTO_RsaPrivateKey *
 GNUNET_CRYPTO_rsa_private_key_decode (const char *buf,
                                      size_t len);
 
@@ -1848,8 +1848,8 @@
  * @param key the private key to duplicate
  * @return the duplicate key; NULL upon error
  */
-struct GNUNET_CRYPTO_rsa_PrivateKey *
-GNUNET_CRYPTO_rsa_private_key_dup (const struct GNUNET_CRYPTO_rsa_PrivateKey 
*key);
+struct GNUNET_CRYPTO_RsaPrivateKey *
+GNUNET_CRYPTO_rsa_private_key_dup (const struct GNUNET_CRYPTO_RsaPrivateKey 
*key);
 
 
 /**
@@ -1858,8 +1858,8 @@
  * @param priv the private key
  * @retur NULL on error, otherwise the public key
  */
-struct GNUNET_CRYPTO_rsa_PublicKey *
-GNUNET_CRYPTO_rsa_private_key_get_public (const struct 
GNUNET_CRYPTO_rsa_PrivateKey *priv);
+struct GNUNET_CRYPTO_RsaPublicKey *
+GNUNET_CRYPTO_rsa_private_key_get_public (const struct 
GNUNET_CRYPTO_RsaPrivateKey *priv);
 
 
 /**
@@ -1869,7 +1869,7 @@
  * @param hc where to store the hash code
  */
 void
-GNUNET_CRYPTO_rsa_public_key_hash (const struct GNUNET_CRYPTO_rsa_PublicKey 
*key,
+GNUNET_CRYPTO_rsa_public_key_hash (const struct GNUNET_CRYPTO_RsaPublicKey 
*key,
                                    struct GNUNET_HashCode *hc);
 
 
@@ -1880,7 +1880,7 @@
  * @return length of the key in bits
  */
 unsigned int
-GNUNET_CRYPTO_rsa_public_key_len (const struct GNUNET_CRYPTO_rsa_PublicKey 
*key);
+GNUNET_CRYPTO_rsa_public_key_len (const struct GNUNET_CRYPTO_RsaPublicKey 
*key);
 
 
 /**
@@ -1889,7 +1889,7 @@
  * @param key pointer to the memory to free
  */
 void
-GNUNET_CRYPTO_rsa_public_key_free (struct GNUNET_CRYPTO_rsa_PublicKey *key);
+GNUNET_CRYPTO_rsa_public_key_free (struct GNUNET_CRYPTO_RsaPublicKey *key);
 
 
 /**
@@ -1901,7 +1901,7 @@
  * @return size of memory allocated in @a buffer
  */
 size_t
-GNUNET_CRYPTO_rsa_public_key_encode (const struct GNUNET_CRYPTO_rsa_PublicKey 
*key,
+GNUNET_CRYPTO_rsa_public_key_encode (const struct GNUNET_CRYPTO_RsaPublicKey 
*key,
                                     char **buffer);
 
 
@@ -1913,7 +1913,7 @@
  * @param len the length of the data in @a buf
  * @return NULL on error
  */
-struct GNUNET_CRYPTO_rsa_PublicKey *
+struct GNUNET_CRYPTO_RsaPublicKey *
 GNUNET_CRYPTO_rsa_public_key_decode (const char *buf,
                                     size_t len);
 
@@ -1924,8 +1924,8 @@
  * @param key the public key to duplicate
  * @return the duplicate key; NULL upon error
  */
-struct GNUNET_CRYPTO_rsa_PublicKey *
-GNUNET_CRYPTO_rsa_public_key_dup (const struct GNUNET_CRYPTO_rsa_PublicKey 
*key);
+struct GNUNET_CRYPTO_RsaPublicKey *
+GNUNET_CRYPTO_rsa_public_key_dup (const struct GNUNET_CRYPTO_RsaPublicKey 
*key);
 
 
 /**
@@ -1958,8 +1958,8 @@
  * @return 0 if the two are equal
  */
 int
-GNUNET_CRYPTO_rsa_signature_cmp (struct GNUNET_CRYPTO_rsa_Signature *s1,
-                                struct GNUNET_CRYPTO_rsa_Signature *s2);
+GNUNET_CRYPTO_rsa_signature_cmp (struct GNUNET_CRYPTO_RsaSignature *s1,
+                                struct GNUNET_CRYPTO_RsaSignature *s2);
 
 /**
  * Compare the values of two private keys.
@@ -1969,8 +1969,8 @@
  * @return 0 if the two are equal
  */
 int
-GNUNET_CRYPTO_rsa_private_key_cmp (struct GNUNET_CRYPTO_rsa_PrivateKey *p1,
-                                 struct GNUNET_CRYPTO_rsa_PrivateKey *p2);
+GNUNET_CRYPTO_rsa_private_key_cmp (struct GNUNET_CRYPTO_RsaPrivateKey *p1,
+                                 struct GNUNET_CRYPTO_RsaPrivateKey *p2);
 
 
 /**
@@ -1981,8 +1981,8 @@
  * @return 0 if the two are equal
  */
 int
-GNUNET_CRYPTO_rsa_public_key_cmp (struct GNUNET_CRYPTO_rsa_PublicKey *p1,
-                                 struct GNUNET_CRYPTO_rsa_PublicKey *p2);
+GNUNET_CRYPTO_rsa_public_key_cmp (struct GNUNET_CRYPTO_RsaPublicKey *p1,
+                                 struct GNUNET_CRYPTO_RsaPublicKey *p2);
 
 
 /**
@@ -2032,7 +2032,7 @@
 size_t
 GNUNET_CRYPTO_rsa_blind (const struct GNUNET_HashCode *hash,
                          struct GNUNET_CRYPTO_rsa_BlindingKey *bkey,
-                         struct GNUNET_CRYPTO_rsa_PublicKey *pkey,
+                         struct GNUNET_CRYPTO_RsaPublicKey *pkey,
                          char **buffer);
 
 
@@ -2044,8 +2044,8 @@
  * @param msg_len number of bytes in @a msg to sign
  * @return NULL on error, signature on success
  */
-struct GNUNET_CRYPTO_rsa_Signature *
-GNUNET_CRYPTO_rsa_sign (const struct GNUNET_CRYPTO_rsa_PrivateKey *key,
+struct GNUNET_CRYPTO_RsaSignature *
+GNUNET_CRYPTO_rsa_sign (const struct GNUNET_CRYPTO_RsaPrivateKey *key,
                         const void *msg,
                         size_t msg_len);
 
@@ -2056,7 +2056,7 @@
  * @param sig memory to free
  */
 void
-GNUNET_CRYPTO_rsa_signature_free (struct GNUNET_CRYPTO_rsa_Signature *sig);
+GNUNET_CRYPTO_rsa_signature_free (struct GNUNET_CRYPTO_RsaSignature *sig);
 
 
 /**
@@ -2067,7 +2067,7 @@
  * @return size of memory allocated in @a buffer
  */
 size_t
-GNUNET_CRYPTO_rsa_signature_encode (const struct GNUNET_CRYPTO_rsa_Signature 
*sig,
+GNUNET_CRYPTO_rsa_signature_encode (const struct GNUNET_CRYPTO_RsaSignature 
*sig,
                                    char **buffer);
 
 
@@ -2079,7 +2079,7 @@
  * @param len the length of the data in @a buf
  * @return NULL on error
  */
-struct GNUNET_CRYPTO_rsa_Signature *
+struct GNUNET_CRYPTO_RsaSignature *
 GNUNET_CRYPTO_rsa_signature_decode (const char *buf,
                                    size_t len);
 
@@ -2090,8 +2090,8 @@
  * @param sig the signature to duplicate
  * @return the duplicate key; NULL upon error
  */
-struct GNUNET_CRYPTO_rsa_Signature *
-GNUNET_CRYPTO_rsa_signature_dup (const struct GNUNET_CRYPTO_rsa_Signature 
*sig);
+struct GNUNET_CRYPTO_RsaSignature *
+GNUNET_CRYPTO_rsa_signature_dup (const struct GNUNET_CRYPTO_RsaSignature *sig);
 
 
 /**
@@ -2104,10 +2104,10 @@
  * @param pkey the public key of the signer
  * @return unblinded signature on success, NULL on error
  */
-struct GNUNET_CRYPTO_rsa_Signature *
-GNUNET_CRYPTO_rsa_unblind (struct GNUNET_CRYPTO_rsa_Signature *sig,
+struct GNUNET_CRYPTO_RsaSignature *
+GNUNET_CRYPTO_rsa_unblind (struct GNUNET_CRYPTO_RsaSignature *sig,
                           struct GNUNET_CRYPTO_rsa_BlindingKey *bkey,
-                          struct GNUNET_CRYPTO_rsa_PublicKey *pkey);
+                          struct GNUNET_CRYPTO_RsaPublicKey *pkey);
 
 
 /**
@@ -2121,8 +2121,8 @@
  */
 int
 GNUNET_CRYPTO_rsa_verify (const struct GNUNET_HashCode *hash,
-                         const struct GNUNET_CRYPTO_rsa_Signature *sig,
-                         const struct GNUNET_CRYPTO_rsa_PublicKey *public_key);
+                         const struct GNUNET_CRYPTO_RsaSignature *sig,
+                         const struct GNUNET_CRYPTO_RsaPublicKey *public_key);
 
 
 #if 0                           /* keep Emacsens' auto-indent happy */

Modified: gnunet/src/include/gnunet_json_lib.h
===================================================================
--- gnunet/src/include/gnunet_json_lib.h        2016-03-20 14:44:36 UTC (rev 
36944)
+++ gnunet/src/include/gnunet_json_lib.h        2016-03-21 13:41:12 UTC (rev 
36945)
@@ -281,7 +281,7 @@
  */
 struct GNUNET_JSON_Specification
 GNUNET_JSON_spec_rsa_public_key (const char *name,
-                                 struct GNUNET_CRYPTO_rsa_PublicKey **pk);
+                                 struct GNUNET_CRYPTO_RsaPublicKey **pk);
 
 
 /**
@@ -292,7 +292,7 @@
  */
 struct GNUNET_JSON_Specification
 GNUNET_JSON_spec_rsa_signature (const char *name,
-                                struct GNUNET_CRYPTO_rsa_Signature **sig);
+                                struct GNUNET_CRYPTO_RsaSignature **sig);
 
 
 /* ****************** Generic generator interface ******************* */
@@ -338,7 +338,7 @@
  * @return corresponding JSON encoding
  */
 json_t *
-GNUNET_JSON_from_rsa_public_key (const struct GNUNET_CRYPTO_rsa_PublicKey *pk);
+GNUNET_JSON_from_rsa_public_key (const struct GNUNET_CRYPTO_RsaPublicKey *pk);
 
 
 /**
@@ -348,7 +348,7 @@
  * @return corresponding JSON encoding
  */
 json_t *
-GNUNET_JSON_from_rsa_signature (const struct GNUNET_CRYPTO_rsa_Signature *sig);
+GNUNET_JSON_from_rsa_signature (const struct GNUNET_CRYPTO_RsaSignature *sig);
 
 
 #endif

Modified: gnunet/src/include/gnunet_pq_lib.h
===================================================================
--- gnunet/src/include/gnunet_pq_lib.h  2016-03-20 14:44:36 UTC (rev 36944)
+++ gnunet/src/include/gnunet_pq_lib.h  2016-03-21 13:41:12 UTC (rev 36945)
@@ -118,7 +118,7 @@
  * @param x the query parameter to pass.
  */
 struct GNUNET_PQ_QueryParam
-GNUNET_PQ_query_param_rsa_public_key (const struct GNUNET_CRYPTO_rsa_PublicKey 
*x);
+GNUNET_PQ_query_param_rsa_public_key (const struct GNUNET_CRYPTO_RsaPublicKey 
*x);
 
 
 /**
@@ -128,7 +128,7 @@
  * @param x the query parameter to pass
  */
 struct GNUNET_PQ_QueryParam
-GNUNET_PQ_query_param_rsa_signature (const struct GNUNET_CRYPTO_rsa_Signature 
*x);
+GNUNET_PQ_query_param_rsa_signature (const struct GNUNET_CRYPTO_RsaSignature 
*x);
 
 
 /**
@@ -330,7 +330,7 @@
  */
 struct GNUNET_PQ_ResultSpec
 GNUNET_PQ_result_spec_rsa_public_key (const char *name,
-                                     struct GNUNET_CRYPTO_rsa_PublicKey **rsa);
+                                     struct GNUNET_CRYPTO_RsaPublicKey **rsa);
 
 
 /**
@@ -342,7 +342,7 @@
  */
 struct GNUNET_PQ_ResultSpec
 GNUNET_PQ_result_spec_rsa_signature (const char *name,
-                                    struct GNUNET_CRYPTO_rsa_Signature **sig);
+                                    struct GNUNET_CRYPTO_RsaSignature **sig);
 
 
 /**

Modified: gnunet/src/json/json_generator.c
===================================================================
--- gnunet/src/json/json_generator.c    2016-03-20 14:44:36 UTC (rev 36944)
+++ gnunet/src/json/json_generator.c    2016-03-21 13:41:12 UTC (rev 36945)
@@ -106,7 +106,7 @@
  * @return corresponding JSON encoding
  */
 json_t *
-GNUNET_JSON_from_rsa_public_key (const struct GNUNET_CRYPTO_rsa_PublicKey *pk)
+GNUNET_JSON_from_rsa_public_key (const struct GNUNET_CRYPTO_RsaPublicKey *pk)
 {
   char *buf;
   size_t buf_len;
@@ -128,7 +128,7 @@
  * @return corresponding JSON encoding
  */
 json_t *
-GNUNET_JSON_from_rsa_signature (const struct GNUNET_CRYPTO_rsa_Signature *sig)
+GNUNET_JSON_from_rsa_signature (const struct GNUNET_CRYPTO_RsaSignature *sig)
 {
   char *buf;
   size_t buf_len;

Modified: gnunet/src/json/json_helper.c
===================================================================
--- gnunet/src/json/json_helper.c       2016-03-20 14:44:36 UTC (rev 36944)
+++ gnunet/src/json/json_helper.c       2016-03-21 13:41:12 UTC (rev 36945)
@@ -690,7 +690,7 @@
                       json_t *root,
                       struct GNUNET_JSON_Specification *spec)
 {
-  struct GNUNET_CRYPTO_rsa_PublicKey **pk = spec->ptr;
+  struct GNUNET_CRYPTO_RsaPublicKey **pk = spec->ptr;
   const char *enc;
   char *buf;
   size_t len;
@@ -736,7 +736,7 @@
 clean_rsa_public_key (void *cls,
                       struct GNUNET_JSON_Specification *spec)
 {
-  struct GNUNET_CRYPTO_rsa_PublicKey **pk = spec->ptr;
+  struct GNUNET_CRYPTO_RsaPublicKey **pk = spec->ptr;
 
   if (NULL != *pk)
   {
@@ -754,7 +754,7 @@
  */
 struct GNUNET_JSON_Specification
 GNUNET_JSON_spec_rsa_public_key (const char *name,
-                                 struct GNUNET_CRYPTO_rsa_PublicKey **pk)
+                                 struct GNUNET_CRYPTO_RsaPublicKey **pk)
 {
   struct GNUNET_JSON_Specification ret = {
     .parser = &parse_rsa_public_key,
@@ -782,7 +782,7 @@
                      json_t *root,
                      struct GNUNET_JSON_Specification *spec)
 {
-  struct GNUNET_CRYPTO_rsa_Signature **sig = spec->ptr;
+  struct GNUNET_CRYPTO_RsaSignature **sig = spec->ptr;
   size_t size;
   const char *str;
   int res;
@@ -828,7 +828,7 @@
 clean_rsa_signature (void *cls,
                      struct GNUNET_JSON_Specification *spec)
 {
-  struct GNUNET_CRYPTO_rsa_Signature  **sig = spec->ptr;
+  struct GNUNET_CRYPTO_RsaSignature  **sig = spec->ptr;
 
   if (NULL != *sig)
   {
@@ -846,7 +846,7 @@
  */
 struct GNUNET_JSON_Specification
 GNUNET_JSON_spec_rsa_signature (const char *name,
-                                struct GNUNET_CRYPTO_rsa_Signature **sig)
+                                struct GNUNET_CRYPTO_RsaSignature **sig)
 {
   struct GNUNET_JSON_Specification ret = {
     .parser = &parse_rsa_signature,

Modified: gnunet/src/json/test_json.c
===================================================================
--- gnunet/src/json/test_json.c 2016-03-20 14:44:36 UTC (rev 36944)
+++ gnunet/src/json/test_json.c 2016-03-21 13:41:12 UTC (rev 36945)
@@ -150,19 +150,19 @@
 static int
 test_rsa ()
 {
-  struct GNUNET_CRYPTO_rsa_PublicKey *pub;
-  struct GNUNET_CRYPTO_rsa_PublicKey *pub2;
+  struct GNUNET_CRYPTO_RsaPublicKey *pub;
+  struct GNUNET_CRYPTO_RsaPublicKey *pub2;
   struct GNUNET_JSON_Specification pspec[] = {
     GNUNET_JSON_spec_rsa_public_key (NULL, &pub2),
     GNUNET_JSON_spec_end()
   };
-  struct GNUNET_CRYPTO_rsa_Signature *sig;
-  struct GNUNET_CRYPTO_rsa_Signature *sig2;
+  struct GNUNET_CRYPTO_RsaSignature *sig;
+  struct GNUNET_CRYPTO_RsaSignature *sig2;
   struct GNUNET_JSON_Specification sspec[] = {
     GNUNET_JSON_spec_rsa_signature (NULL, &sig2),
     GNUNET_JSON_spec_end()
   };
-  struct GNUNET_CRYPTO_rsa_PrivateKey *priv;
+  struct GNUNET_CRYPTO_RsaPrivateKey *priv;
   char msg[] = "Hello";
   json_t *jp;
   json_t *js;

Modified: gnunet/src/pq/pq_query_helper.c
===================================================================
--- gnunet/src/pq/pq_query_helper.c     2016-03-20 14:44:36 UTC (rev 36944)
+++ gnunet/src/pq/pq_query_helper.c     2016-03-21 13:41:12 UTC (rev 36945)
@@ -265,7 +265,7 @@
                      void *scratch[],
                      unsigned int scratch_length)
 {
-  const struct GNUNET_CRYPTO_rsa_PublicKey *rsa = data;
+  const struct GNUNET_CRYPTO_RsaPublicKey *rsa = data;
   char *buf;
   size_t buf_size;
 
@@ -290,7 +290,7 @@
  * @return array entry for the query parameters to use
  */
 struct GNUNET_PQ_QueryParam
-GNUNET_PQ_query_param_rsa_public_key (const struct GNUNET_CRYPTO_rsa_PublicKey 
*x)
+GNUNET_PQ_query_param_rsa_public_key (const struct GNUNET_CRYPTO_RsaPublicKey 
*x)
 {
   struct GNUNET_PQ_QueryParam res =
     { &qconv_rsa_public_key, NULL, (x), 0, 1 };
@@ -323,7 +323,7 @@
                     void *scratch[],
                     unsigned int scratch_length)
 {
-  const struct GNUNET_CRYPTO_rsa_Signature *sig = data;
+  const struct GNUNET_CRYPTO_RsaSignature *sig = data;
   char *buf;
   size_t buf_size;
 
@@ -348,7 +348,7 @@
  * @return array entry for the query parameters to use
  */
 struct GNUNET_PQ_QueryParam
-GNUNET_PQ_query_param_rsa_signature (const struct GNUNET_CRYPTO_rsa_Signature 
*x)
+GNUNET_PQ_query_param_rsa_signature (const struct GNUNET_CRYPTO_RsaSignature 
*x)
 {
   struct GNUNET_PQ_QueryParam res =
     { &qconv_rsa_signature, NULL, (x), 0, 1 };

Modified: gnunet/src/pq/pq_result_helper.c
===================================================================
--- gnunet/src/pq/pq_result_helper.c    2016-03-20 14:44:36 UTC (rev 36944)
+++ gnunet/src/pq/pq_result_helper.c    2016-03-21 13:41:12 UTC (rev 36945)
@@ -233,7 +233,7 @@
                        size_t *dst_size,
                        void *dst)
 {
-  struct GNUNET_CRYPTO_rsa_PublicKey **pk = dst;
+  struct GNUNET_CRYPTO_RsaPublicKey **pk = dst;
   size_t len;
   const char *res;
   int fnum;
@@ -285,7 +285,7 @@
 clean_rsa_public_key (void *cls,
                      void *rd)
 {
-  struct GNUNET_CRYPTO_rsa_PublicKey **pk = rd;
+  struct GNUNET_CRYPTO_RsaPublicKey **pk = rd;
   
   if (NULL != *pk)
   {
@@ -304,7 +304,7 @@
  */
 struct GNUNET_PQ_ResultSpec
 GNUNET_PQ_result_spec_rsa_public_key (const char *name,
-                                     struct GNUNET_CRYPTO_rsa_PublicKey **rsa)
+                                     struct GNUNET_CRYPTO_RsaPublicKey **rsa)
 {
   struct GNUNET_PQ_ResultSpec res =
     { &extract_rsa_public_key,
@@ -337,7 +337,7 @@
                       size_t *dst_size,
                       void *dst)
 {
-  struct GNUNET_CRYPTO_rsa_Signature **sig = dst;
+  struct GNUNET_CRYPTO_RsaSignature **sig = dst;
   size_t len;
   const char *res;
   int fnum;
@@ -389,7 +389,7 @@
 clean_rsa_signature (void *cls,
                     void *rd)
 {
-  struct GNUNET_CRYPTO_rsa_Signature **sig = rd;
+  struct GNUNET_CRYPTO_RsaSignature **sig = rd;
 
   if (NULL != *sig)
   {
@@ -408,7 +408,7 @@
  */
 struct GNUNET_PQ_ResultSpec
 GNUNET_PQ_result_spec_rsa_signature (const char *name,
-                                   struct GNUNET_CRYPTO_rsa_Signature **sig)
+                                   struct GNUNET_CRYPTO_RsaSignature **sig)
 {
   struct GNUNET_PQ_ResultSpec res =
     { &extract_rsa_signature,

Modified: gnunet/src/pq/test_pq.c
===================================================================
--- gnunet/src/pq/test_pq.c     2016-03-20 14:44:36 UTC (rev 36944)
+++ gnunet/src/pq/test_pq.c     2016-03-21 13:41:12 UTC (rev 36945)
@@ -89,10 +89,10 @@
 static int
 run_queries (PGconn *conn)
 {
-  struct GNUNET_CRYPTO_rsa_PublicKey *pub;
-  struct GNUNET_CRYPTO_rsa_PublicKey *pub2 = NULL;
-  struct GNUNET_CRYPTO_rsa_Signature *sig;
-  struct GNUNET_CRYPTO_rsa_Signature *sig2 = NULL;
+  struct GNUNET_CRYPTO_RsaPublicKey *pub;
+  struct GNUNET_CRYPTO_RsaPublicKey *pub2 = NULL;
+  struct GNUNET_CRYPTO_RsaSignature *sig;
+  struct GNUNET_CRYPTO_RsaSignature *sig2 = NULL;
   struct GNUNET_TIME_Absolute abs_time = GNUNET_TIME_absolute_get ();
   struct GNUNET_TIME_Absolute abs_time2;
   struct GNUNET_TIME_Absolute forever = GNUNET_TIME_UNIT_FOREVER_ABS;
@@ -101,7 +101,7 @@
   struct GNUNET_HashCode hc2;
   PGresult *result;
   int ret;
-  struct GNUNET_CRYPTO_rsa_PrivateKey *priv;
+  struct GNUNET_CRYPTO_RsaPrivateKey *priv;
   char msg[] = "Hello";
   void *msg2;
   size_t msg2_len;

Modified: gnunet/src/util/crypto_rsa.c
===================================================================
--- gnunet/src/util/crypto_rsa.c        2016-03-20 14:44:36 UTC (rev 36944)
+++ gnunet/src/util/crypto_rsa.c        2016-03-21 13:41:12 UTC (rev 36945)
@@ -30,7 +30,7 @@
 /**
  * The private information of an RSA key pair.
  */
-struct GNUNET_CRYPTO_rsa_PrivateKey
+struct GNUNET_CRYPTO_RsaPrivateKey
 {
   /**
    * Libgcrypt S-expression for the RSA private key.
@@ -42,7 +42,7 @@
 /**
  * The public information of an RSA key pair.
  */
-struct GNUNET_CRYPTO_rsa_PublicKey
+struct GNUNET_CRYPTO_RsaPublicKey
 {
   /**
    * Libgcrypt S-expression for the RSA public key.
@@ -54,7 +54,7 @@
 /**
  * @brief an RSA signature
  */
-struct GNUNET_CRYPTO_rsa_Signature
+struct GNUNET_CRYPTO_RsaSignature
 {
   /**
    * Libgcrypt S-expression for the RSA signature.
@@ -140,10 +140,10 @@
  * @param len length of the key in bits (i.e. 2048)
  * @return fresh private key
  */
-struct GNUNET_CRYPTO_rsa_PrivateKey *
+struct GNUNET_CRYPTO_RsaPrivateKey *
 GNUNET_CRYPTO_rsa_private_key_create (unsigned int len)
 {
-  struct GNUNET_CRYPTO_rsa_PrivateKey *ret;
+  struct GNUNET_CRYPTO_RsaPrivateKey *ret;
   gcry_sexp_t s_key;
   gcry_sexp_t s_keyparam;
 
@@ -160,7 +160,7 @@
   GNUNET_assert (0 ==
                  gcry_pk_testkey (s_key));
 #endif
-  ret = GNUNET_new (struct GNUNET_CRYPTO_rsa_PrivateKey);
+  ret = GNUNET_new (struct GNUNET_CRYPTO_RsaPrivateKey);
   ret->sexp = s_key;
   return ret;
 }
@@ -172,7 +172,7 @@
  * @param key pointer to the memory to free
  */
 void
-GNUNET_CRYPTO_rsa_private_key_free (struct GNUNET_CRYPTO_rsa_PrivateKey *key)
+GNUNET_CRYPTO_rsa_private_key_free (struct GNUNET_CRYPTO_RsaPrivateKey *key)
 {
   gcry_sexp_release (key->sexp);
   GNUNET_free (key);
@@ -188,7 +188,7 @@
  * @return size of memory allocated in @a buffer
  */
 size_t
-GNUNET_CRYPTO_rsa_private_key_encode (const struct 
GNUNET_CRYPTO_rsa_PrivateKey *key,
+GNUNET_CRYPTO_rsa_private_key_encode (const struct GNUNET_CRYPTO_RsaPrivateKey 
*key,
                                       char **buffer)
 {
   size_t n;
@@ -217,12 +217,12 @@
  * @param len the length of the data in @a buf
  * @return NULL on error
  */
-struct GNUNET_CRYPTO_rsa_PrivateKey *
+struct GNUNET_CRYPTO_RsaPrivateKey *
 GNUNET_CRYPTO_rsa_private_key_decode (const char *buf,
                                       size_t len)
 {
-  struct GNUNET_CRYPTO_rsa_PrivateKey *key;
-  key = GNUNET_new (struct GNUNET_CRYPTO_rsa_PrivateKey);
+  struct GNUNET_CRYPTO_RsaPrivateKey *key;
+  key = GNUNET_new (struct GNUNET_CRYPTO_RsaPrivateKey);
   if (0 !=
       gcry_sexp_new (&key->sexp,
                      buf,
@@ -251,10 +251,10 @@
  * @param priv the private key
  * @retur NULL on error, otherwise the public key
  */
-struct GNUNET_CRYPTO_rsa_PublicKey *
-GNUNET_CRYPTO_rsa_private_key_get_public (const struct 
GNUNET_CRYPTO_rsa_PrivateKey *priv)
+struct GNUNET_CRYPTO_RsaPublicKey *
+GNUNET_CRYPTO_rsa_private_key_get_public (const struct 
GNUNET_CRYPTO_RsaPrivateKey *priv)
 {
-  struct GNUNET_CRYPTO_rsa_PublicKey *pub;
+  struct GNUNET_CRYPTO_RsaPublicKey *pub;
   gcry_mpi_t ne[2];
   int rc;
   gcry_sexp_t result;
@@ -276,7 +276,7 @@
                         ne[1]);
   gcry_mpi_release (ne[0]);
   gcry_mpi_release (ne[1]);
-  pub = GNUNET_new (struct GNUNET_CRYPTO_rsa_PublicKey);
+  pub = GNUNET_new (struct GNUNET_CRYPTO_RsaPublicKey);
   pub->sexp = result;
   return pub;
 }
@@ -288,7 +288,7 @@
  * @param key pointer to the memory to free
  */
 void
-GNUNET_CRYPTO_rsa_public_key_free (struct GNUNET_CRYPTO_rsa_PublicKey *key)
+GNUNET_CRYPTO_rsa_public_key_free (struct GNUNET_CRYPTO_RsaPublicKey *key)
 {
   gcry_sexp_release (key->sexp);
   GNUNET_free (key);
@@ -304,7 +304,7 @@
  * @return size of memory allocated in @a buffer
  */
 size_t
-GNUNET_CRYPTO_rsa_public_key_encode (const struct GNUNET_CRYPTO_rsa_PublicKey 
*key,
+GNUNET_CRYPTO_rsa_public_key_encode (const struct GNUNET_CRYPTO_RsaPublicKey 
*key,
                                      char **buffer)
 {
   size_t n;
@@ -332,7 +332,7 @@
  * @param hc where to store the hash code
  */
 void
-GNUNET_CRYPTO_rsa_public_key_hash (const struct GNUNET_CRYPTO_rsa_PublicKey 
*key,
+GNUNET_CRYPTO_rsa_public_key_hash (const struct GNUNET_CRYPTO_RsaPublicKey 
*key,
                                    struct GNUNET_HashCode *hc)
 {
   char *buf;
@@ -355,15 +355,15 @@
  * @param len the length of the data in @a buf
  * @return NULL on error
  */
-struct GNUNET_CRYPTO_rsa_PublicKey *
+struct GNUNET_CRYPTO_RsaPublicKey *
 GNUNET_CRYPTO_rsa_public_key_decode (const char *buf,
                                      size_t len)
 {
-  struct GNUNET_CRYPTO_rsa_PublicKey *key;
+  struct GNUNET_CRYPTO_RsaPublicKey *key;
   gcry_mpi_t n;
   int ret;
 
-  key = GNUNET_new (struct GNUNET_CRYPTO_rsa_PublicKey);
+  key = GNUNET_new (struct GNUNET_CRYPTO_RsaPublicKey);
   if (0 !=
       gcry_sexp_new (&key->sexp,
                      buf,
@@ -435,8 +435,8 @@
  * @return 0 if the two are equal
  */
 int
-GNUNET_CRYPTO_rsa_signature_cmp (struct GNUNET_CRYPTO_rsa_Signature *s1,
-                                struct GNUNET_CRYPTO_rsa_Signature *s2)
+GNUNET_CRYPTO_rsa_signature_cmp (struct GNUNET_CRYPTO_RsaSignature *s1,
+                                struct GNUNET_CRYPTO_RsaSignature *s2)
 {
   char *b1;
   char *b2;
@@ -468,8 +468,8 @@
  * @return 0 if the two are equal
  */
 int
-GNUNET_CRYPTO_rsa_public_key_cmp (struct GNUNET_CRYPTO_rsa_PublicKey *p1,
-                                 struct GNUNET_CRYPTO_rsa_PublicKey *p2)
+GNUNET_CRYPTO_rsa_public_key_cmp (struct GNUNET_CRYPTO_RsaPublicKey *p1,
+                                 struct GNUNET_CRYPTO_RsaPublicKey *p2)
 {
   char *b1;
   char *b2;
@@ -501,8 +501,8 @@
  * @return 0 if the two are equal
  */
 int
-GNUNET_CRYPTO_rsa_private_key_cmp (struct GNUNET_CRYPTO_rsa_PrivateKey *p1,
-                                   struct GNUNET_CRYPTO_rsa_PrivateKey *p2)
+GNUNET_CRYPTO_rsa_private_key_cmp (struct GNUNET_CRYPTO_RsaPrivateKey *p1,
+                                   struct GNUNET_CRYPTO_RsaPrivateKey *p2)
 {
   char *b1;
   char *b2;
@@ -533,7 +533,7 @@
  * @return length of the key in bits
  */
 unsigned int
-GNUNET_CRYPTO_rsa_public_key_len (const struct GNUNET_CRYPTO_rsa_PublicKey 
*key)
+GNUNET_CRYPTO_rsa_public_key_len (const struct GNUNET_CRYPTO_RsaPublicKey *key)
 {
   gcry_mpi_t n;
   int ret;
@@ -645,27 +645,32 @@
 
 
 /**
- * Computes a full domain hash seeded by the given public key.  
+ * Computes a full domain hash seeded by the given public key.
  * This gives a measure of provable security to the Taler exchange
  * against one-more forgery attacks.  See:
  *   https://eprint.iacr.org/2001/002.pdf
  *   http://www.di.ens.fr/~pointche/Documents/Papers/2001_fcA.pdf
  *
+ * @param[out] r MPI value set to the FDH
  * @param hash initial hash of the message to sign
  * @param pkey the public key of the signer
+ * @param rsize FIXME JEFF
  * @return libgcrypt error that to represent an allocation failure
  */
 gcry_error_t
 rsa_full_domain_hash (gcry_mpi_t *r,
                       const struct GNUNET_HashCode *hash,
-                      const struct GNUNET_CRYPTO_rsa_PublicKey *pkey,
+                      const struct GNUNET_CRYPTO_RsaPublicKey *pkey,
                       size_t *rsize)
 {
-  int i,nbits,nhashes;
+  unsigned int i;
+  unsigned int nbits;
+  unsigned int nhashes;
   gcry_error_t rc;
   char *buf;
   size_t buf_len;
-  gcry_md_hd_t h,h0;
+  gcry_md_hd_t h;
+  gcry_md_hd_t h0;
   struct GNUNET_HashCode *hs;
 
   /* Uncomment the following to debug without using the full domain hash */
@@ -675,42 +680,47 @@
                       (const unsigned char *)hash,
                       sizeof(struct GNUNET_HashCode),
                       rsize);
-  return rc; 
+  return rc;
   */
 
   nbits = GNUNET_CRYPTO_rsa_public_key_len (pkey);
-  // calls gcry_mpi_get_nbits(.. pkey->sexp ..)
   if (nbits < 512)
     nbits = 512;
 
-  // Already almost an HMAC since we consume a hash, so no GCRY_MD_FLAG_HMAC.
-  rc = gcry_md_open (&h,GCRY_MD_SHA512,0);
-  if (0 != rc)  return rc;
+  /* Already almost an HMAC since we consume a hash, so no GCRY_MD_FLAG_HMAC. 
*/
+  rc = gcry_md_open (&h, GCRY_MD_SHA512, 0);
+  if (0 != rc)
+    return rc;
 
-  // We seed with the public denomination key as a homage to RSA-PSS by 
+  // We seed with the public denomination key as a homage to RSA-PSS by
   // Mihir Bellare and Phillip Rogaway.  Doing this lowers the degree
-  // of the hypothetical polyomial-time attack on RSA-KTI created by a 
+  // of the hypothetical polyomial-time attack on RSA-KTI created by a
   // polynomial-time one-more forgary attack.  Yey seeding!
   buf_len = GNUNET_CRYPTO_rsa_public_key_encode (pkey, &buf);
-  gcry_md_write (h, buf,buf_len);
+  gcry_md_write (h, buf, buf_len);
   GNUNET_free (buf);
 
   nhashes = (nbits-1) / (8 * sizeof(struct GNUNET_HashCode)) + 1;
-  hs = (struct GNUNET_HashCode *)GNUNET_malloc (nhashes * sizeof(struct 
GNUNET_HashCode));
-  for (i=0; i<nhashes; i++) 
+  hs = GNUNET_new_array (nhashes,
+                         struct GNUNET_HashCode);
+  for (i=0; i<nhashes; i++)
   {
     gcry_md_write (h, hash, sizeof(struct GNUNET_HashCode));
     rc = gcry_md_copy (&h0, h);
-    if (0 != rc)  break;
+    if (0 != rc)
+    {
+      gcry_md_close (h0);
+      break;
+    }
     gcry_md_putc (h0, i % 256);
-    // gcry_md_final (&h0);
-    memcpy (&hs[i], 
-            gcry_md_read (h0,GCRY_MD_SHA512), 
+    memcpy (&hs[i],
+            gcry_md_read (h0, GCRY_MD_SHA512),
             sizeof(struct GNUNET_HashCode));
     gcry_md_close (h0);
   }
   gcry_md_close (h);
-  if (0 != rc) {
+  if (0 != rc)
+  {
     GNUNET_free (hs);
     return rc;
   }
@@ -717,18 +727,17 @@
 
   rc = gcry_mpi_scan (r,
                       GCRYMPI_FMT_USG,
-                      (const unsigned char *)hs,
+                      (const unsigned char *) hs,
                       nhashes * sizeof(struct GNUNET_HashCode),
                       rsize);
   GNUNET_free (hs);
-  if (0 != rc)  return rc;
+  if (0 != rc)
+    return rc;
 
-  // Do not allow *r to exceed n or signatures fail to verify unpredictably. 
-  // This happening with  gcry_mpi_clear_highbit (*r, nbits-1)  so maybe     
-  // gcry_mpi_clear_highbit  is broken, but setting the highbit sounds good. 
-  // (void) fprintf (stderr, "%d %d %d",nbits,nhashes, 
gcry_mpi_get_nbits(*r)); 
+  // Do not allow *r to exceed n or signatures fail to verify unpredictably.
+  // This happening with  gcry_mpi_clear_highbit (*r, nbits-1) so maybe
+  // gcry_mpi_clear_highbit is broken, but setting the highbit sounds good.
   gcry_mpi_set_highbit (*r, nbits-2);
-  // (void) fprintf (stderr, " %d\n",gcry_mpi_get_nbits(*r)); 
   return rc;
 }
 
@@ -745,7 +754,7 @@
 size_t
 GNUNET_CRYPTO_rsa_blind (const struct GNUNET_HashCode *hash,
                          struct GNUNET_CRYPTO_rsa_BlindingKey *bkey,
-                         struct GNUNET_CRYPTO_rsa_PublicKey *pkey,
+                         struct GNUNET_CRYPTO_RsaPublicKey *pkey,
                          char **buffer)
 {
   gcry_mpi_t data;
@@ -767,7 +776,7 @@
     return 0;
   }
 
-  rc = rsa_full_domain_hash(&data, hash, pkey, &rsize);
+  rc = rsa_full_domain_hash (&data, hash, pkey, &rsize);
   if (0 != rc)  // Allocation error in libgcrypt
   {
     GNUNET_break (0);
@@ -824,13 +833,14 @@
  * @param value the MPI to sign
  * @return NULL on error, signature on success
  */
-struct GNUNET_CRYPTO_rsa_Signature *
-rsa_sign_mpi (const struct GNUNET_CRYPTO_rsa_PrivateKey *key,
+static struct GNUNET_CRYPTO_RsaSignature *
+rsa_sign_mpi (const struct GNUNET_CRYPTO_RsaPrivateKey *key,
               gcry_mpi_t value)
 {
-  struct GNUNET_CRYPTO_rsa_Signature *sig;
-  struct GNUNET_CRYPTO_rsa_PublicKey *public_key;
-  gcry_sexp_t data,result;
+  struct GNUNET_CRYPTO_RsaSignature *sig;
+  struct GNUNET_CRYPTO_RsaPublicKey *public_key;
+  gcry_sexp_t data;
+  gcry_sexp_t result;
 
   data = mpi_to_sexp (value);
   gcry_mpi_release (value);
@@ -851,7 +861,7 @@
                       data,
                       public_key->sexp))
   {
-    GNUNET_break (0);  
+    GNUNET_break (0);
     GNUNET_CRYPTO_rsa_public_key_free (public_key);
     gcry_sexp_release (data);
     gcry_sexp_release (result);
@@ -861,7 +871,7 @@
 
   /* return signature */
   gcry_sexp_release (data);
-  sig = GNUNET_new (struct GNUNET_CRYPTO_rsa_Signature);
+  sig = GNUNET_new (struct GNUNET_CRYPTO_RsaSignature);
   sig->sexp = result;
   return sig;
 }
@@ -875,14 +885,14 @@
  * @param msg_len number of bytes in @a msg to sign
  * @return NULL on error, signature on success
  */
-struct GNUNET_CRYPTO_rsa_Signature *
-GNUNET_CRYPTO_rsa_sign_blinded (const struct GNUNET_CRYPTO_rsa_PrivateKey *key,
+struct GNUNET_CRYPTO_RsaSignature *
+GNUNET_CRYPTO_rsa_sign_blinded (const struct GNUNET_CRYPTO_RsaPrivateKey *key,
                                 const void *msg,
                                 size_t msg_len)
 {
   gcry_mpi_t v = NULL;
 
-  GNUNET_assert (0 == 
+  GNUNET_assert (0 ==
                  gcry_mpi_scan (&v,
                                 GCRYMPI_FMT_USG,
                                 msg,
@@ -889,7 +899,7 @@
                                 msg_len,
                                 NULL));
 
-  return rsa_sign_mpi (key,v);
+  return rsa_sign_mpi (key, v);
 }
 
 
@@ -900,11 +910,11 @@
  * @param hash the hash of the message to sign
  * @return NULL on error, signature on success
  */
-struct GNUNET_CRYPTO_rsa_Signature *
-GNUNET_CRYPTO_rsa_sign_fdh (const struct GNUNET_CRYPTO_rsa_PrivateKey *key,
+struct GNUNET_CRYPTO_RsaSignature *
+GNUNET_CRYPTO_rsa_sign_fdh (const struct GNUNET_CRYPTO_RsaPrivateKey *key,
                            const struct GNUNET_HashCode *hash)
 {
-  struct GNUNET_CRYPTO_rsa_PublicKey *pkey;
+  struct GNUNET_CRYPTO_RsaPublicKey *pkey;
   gcry_mpi_t v = NULL;
   gcry_error_t rc;
 
@@ -923,7 +933,7 @@
  * @param sig memory to freee
  */
 void
-GNUNET_CRYPTO_rsa_signature_free (struct GNUNET_CRYPTO_rsa_Signature *sig)
+GNUNET_CRYPTO_rsa_signature_free (struct GNUNET_CRYPTO_RsaSignature *sig)
 {
   gcry_sexp_release (sig->sexp);
   GNUNET_free (sig);
@@ -938,7 +948,7 @@
  * @return size of memory allocated in @a buffer
  */
 size_t
-GNUNET_CRYPTO_rsa_signature_encode (const struct GNUNET_CRYPTO_rsa_Signature 
*sig,
+GNUNET_CRYPTO_rsa_signature_encode (const struct GNUNET_CRYPTO_RsaSignature 
*sig,
                                    char **buffer)
 {
   size_t n;
@@ -967,15 +977,15 @@
  * @param len the length of the data in @a buf
  * @return NULL on error
  */
-struct GNUNET_CRYPTO_rsa_Signature *
+struct GNUNET_CRYPTO_RsaSignature *
 GNUNET_CRYPTO_rsa_signature_decode (const char *buf,
                                     size_t len)
 {
-  struct GNUNET_CRYPTO_rsa_Signature *sig;
+  struct GNUNET_CRYPTO_RsaSignature *sig;
   int ret;
   gcry_mpi_t s;
 
-  sig = GNUNET_new (struct GNUNET_CRYPTO_rsa_Signature);
+  sig = GNUNET_new (struct GNUNET_CRYPTO_RsaSignature);
   if (0 !=
       gcry_sexp_new (&sig->sexp,
                      buf,
@@ -1009,10 +1019,10 @@
  * @param key the public key to duplicate
  * @return the duplicate key; NULL upon error
  */
-struct GNUNET_CRYPTO_rsa_PublicKey *
-GNUNET_CRYPTO_rsa_public_key_dup (const struct GNUNET_CRYPTO_rsa_PublicKey 
*key)
+struct GNUNET_CRYPTO_RsaPublicKey *
+GNUNET_CRYPTO_rsa_public_key_dup (const struct GNUNET_CRYPTO_RsaPublicKey *key)
 {
-  struct GNUNET_CRYPTO_rsa_PublicKey *dup;
+  struct GNUNET_CRYPTO_RsaPublicKey *dup;
   gcry_sexp_t dup_sexp;
   size_t erroff;
 
@@ -1022,7 +1032,7 @@
   gcry_sexp_release (dup_sexp);
   /* copy the sexp */
   GNUNET_assert (0 == gcry_sexp_build (&dup_sexp, &erroff, "%S", key->sexp));
-  dup = GNUNET_new (struct GNUNET_CRYPTO_rsa_PublicKey);
+  dup = GNUNET_new (struct GNUNET_CRYPTO_RsaPublicKey);
   dup->sexp = dup_sexp;
   return dup;
 }
@@ -1038,10 +1048,10 @@
  * @param pkey the public key of the signer
  * @return unblinded signature on success, NULL on error
  */
-struct GNUNET_CRYPTO_rsa_Signature *
-GNUNET_CRYPTO_rsa_unblind (struct GNUNET_CRYPTO_rsa_Signature *sig,
+struct GNUNET_CRYPTO_RsaSignature *
+GNUNET_CRYPTO_rsa_unblind (struct GNUNET_CRYPTO_RsaSignature *sig,
                            struct GNUNET_CRYPTO_rsa_BlindingKey *bkey,
-                           struct GNUNET_CRYPTO_rsa_PublicKey *pkey)
+                           struct GNUNET_CRYPTO_RsaPublicKey *pkey)
 {
   gcry_mpi_t n;
   gcry_mpi_t s;
@@ -1048,7 +1058,7 @@
   gcry_mpi_t r_inv;
   gcry_mpi_t ubsig;
   int ret;
-  struct GNUNET_CRYPTO_rsa_Signature *sret;
+  struct GNUNET_CRYPTO_RsaSignature *sret;
 
   ret = key_from_sexp (&n, pkey->sexp, "public-key", "n");
   if (0 != ret)
@@ -1085,7 +1095,7 @@
   gcry_mpi_release (r_inv);
   gcry_mpi_release (s);
 
-  sret = GNUNET_new (struct GNUNET_CRYPTO_rsa_Signature);
+  sret = GNUNET_new (struct GNUNET_CRYPTO_RsaSignature);
   GNUNET_assert (0 ==
                  gcry_sexp_build (&sret->sexp,
                                   NULL,
@@ -1107,8 +1117,8 @@
  */
 int
 GNUNET_CRYPTO_rsa_verify (const struct GNUNET_HashCode *hash,
-                          const struct GNUNET_CRYPTO_rsa_Signature *sig,
-                          const struct GNUNET_CRYPTO_rsa_PublicKey *pkey)
+                          const struct GNUNET_CRYPTO_RsaSignature *sig,
+                          const struct GNUNET_CRYPTO_RsaPublicKey *pkey)
 {
   gcry_sexp_t data;
   gcry_mpi_t r;
@@ -1142,10 +1152,10 @@
  * @param key the private key to duplicate
  * @return the duplicate key; NULL upon error
  */
-struct GNUNET_CRYPTO_rsa_PrivateKey *
-GNUNET_CRYPTO_rsa_private_key_dup (const struct GNUNET_CRYPTO_rsa_PrivateKey 
*key)
+struct GNUNET_CRYPTO_RsaPrivateKey *
+GNUNET_CRYPTO_rsa_private_key_dup (const struct GNUNET_CRYPTO_RsaPrivateKey 
*key)
 {
-  struct GNUNET_CRYPTO_rsa_PrivateKey *dup;
+  struct GNUNET_CRYPTO_RsaPrivateKey *dup;
   gcry_sexp_t dup_sexp;
   size_t erroff;
 
@@ -1155,7 +1165,7 @@
   gcry_sexp_release (dup_sexp);
   /* copy the sexp */
   GNUNET_assert (0 == gcry_sexp_build (&dup_sexp, &erroff, "%S", key->sexp));
-  dup = GNUNET_new (struct GNUNET_CRYPTO_rsa_PrivateKey);
+  dup = GNUNET_new (struct GNUNET_CRYPTO_RsaPrivateKey);
   dup->sexp = dup_sexp;
   return dup;
 }
@@ -1167,10 +1177,10 @@
  * @param key the private key to duplicate
  * @return the duplicate key; NULL upon error
  */
-struct GNUNET_CRYPTO_rsa_Signature *
-GNUNET_CRYPTO_rsa_signature_dup (const struct GNUNET_CRYPTO_rsa_Signature *sig)
+struct GNUNET_CRYPTO_RsaSignature *
+GNUNET_CRYPTO_rsa_signature_dup (const struct GNUNET_CRYPTO_RsaSignature *sig)
 {
-  struct GNUNET_CRYPTO_rsa_Signature *dup;
+  struct GNUNET_CRYPTO_RsaSignature *dup;
   gcry_sexp_t dup_sexp;
   size_t erroff;
   gcry_mpi_t s;
@@ -1184,7 +1194,7 @@
   gcry_mpi_release (s);
   /* copy the sexp */
   GNUNET_assert (0 == gcry_sexp_build (&dup_sexp, &erroff, "%S", sig->sexp));
-  dup = GNUNET_new (struct GNUNET_CRYPTO_rsa_Signature);
+  dup = GNUNET_new (struct GNUNET_CRYPTO_RsaSignature);
   dup->sexp = dup_sexp;
   return dup;
 }

Modified: gnunet/src/util/perf_crypto_rsa.c
===================================================================
--- gnunet/src/util/perf_crypto_rsa.c   2016-03-20 14:44:36 UTC (rev 36944)
+++ gnunet/src/util/perf_crypto_rsa.c   2016-03-21 13:41:12 UTC (rev 36945)
@@ -37,10 +37,10 @@
 eval (unsigned int len)
 {
   struct GNUNET_TIME_Absolute start;
-  struct GNUNET_CRYPTO_rsa_Signature *sig;
-  struct GNUNET_CRYPTO_rsa_Signature *rsig;
-  struct GNUNET_CRYPTO_rsa_PublicKey *public_key;
-  struct GNUNET_CRYPTO_rsa_PrivateKey *private_key;
+  struct GNUNET_CRYPTO_RsaSignature *sig;
+  struct GNUNET_CRYPTO_RsaSignature *rsig;
+  struct GNUNET_CRYPTO_RsaPublicKey *public_key;
+  struct GNUNET_CRYPTO_RsaPrivateKey *private_key;
   struct GNUNET_CRYPTO_rsa_BlindingKey *bkey;
   unsigned int i;
   char sbuf[128];

Modified: gnunet/src/util/test_crypto_rsa.c
===================================================================
--- gnunet/src/util/test_crypto_rsa.c   2016-03-20 14:44:36 UTC (rev 36944)
+++ gnunet/src/util/test_crypto_rsa.c   2016-03-21 13:41:12 UTC (rev 36945)
@@ -29,7 +29,7 @@
 gcry_error_t
 rsa_full_domain_hash (gcry_mpi_t *r,
                       const struct GNUNET_HashCode *hash,
-                      const struct GNUNET_CRYPTO_rsa_PublicKey *pkey,
+                      const struct GNUNET_CRYPTO_RsaPublicKey *pkey,
                       size_t *rsize);
 
 
@@ -39,14 +39,14 @@
 {
 #define RND_BLK_SIZE 4096
   unsigned char rnd_blk[RND_BLK_SIZE];
-  struct GNUNET_CRYPTO_rsa_PrivateKey *priv;
-  struct GNUNET_CRYPTO_rsa_PrivateKey *priv_copy;
-  struct GNUNET_CRYPTO_rsa_PublicKey *pub;
-  struct GNUNET_CRYPTO_rsa_PublicKey *pub_copy;
+  struct GNUNET_CRYPTO_RsaPrivateKey *priv;
+  struct GNUNET_CRYPTO_RsaPrivateKey *priv_copy;
+  struct GNUNET_CRYPTO_RsaPublicKey *pub;
+  struct GNUNET_CRYPTO_RsaPublicKey *pub_copy;
   struct GNUNET_CRYPTO_rsa_BlindingKey *bkey;
-  struct GNUNET_CRYPTO_rsa_Signature *sig;
-  struct GNUNET_CRYPTO_rsa_Signature *sig_copy;
-  struct GNUNET_CRYPTO_rsa_Signature *bsig;
+  struct GNUNET_CRYPTO_RsaSignature *sig;
+  struct GNUNET_CRYPTO_RsaSignature *sig_copy;
+  struct GNUNET_CRYPTO_RsaSignature *bsig;
   struct GNUNET_HashCode hash;
   char *blind_buf;
   size_t bsize;




reply via email to

[Prev in Thread] Current Thread [Next in Thread]