[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[taler-anastasis] branch master updated: uncrustify
From: |
gnunet |
Subject: |
[taler-anastasis] branch master updated: uncrustify |
Date: |
Mon, 20 Apr 2020 01:16:55 +0200 |
This is an automated email from the git hooks/post-receive script.
ds-meister pushed a commit to branch master
in repository anastasis.
The following commit(s) were added to refs/heads/master by this push:
new f3a0f2e uncrustify
f3a0f2e is described below
commit f3a0f2eac7930e8fd731ad94426b1092a70528ed
Author: Dominik Meister <address@hidden>
AuthorDate: Mon Apr 20 01:16:46 2020 +0200
uncrustify
---
src/lib/anastasis.c | 84 ++++++++++++++++++++++++++---------------------------
1 file changed, 42 insertions(+), 42 deletions(-)
diff --git a/src/lib/anastasis.c b/src/lib/anastasis.c
index dfc7d8e..6dbd66d 100644
--- a/src/lib/anastasis.c
+++ b/src/lib/anastasis.c
@@ -123,19 +123,19 @@ struct ANASTASIS_Challenge
/**
* Key used to encrypt the truth passed to the server
*/
- struct ANASTASIS_CRYPTO_TruthKey truth_key;
+ struct ANASTASIS_CRYPTO_TruthKey truth_key;
/**
* Salt used to encrypt the truth
*/
- struct ANASTASIS_CRYPTO_Salt truth_salt;
+ struct ANASTASIS_CRYPTO_Salt truth_salt;
/**
* plaintext challenge which is sent to the client
*/
- void *challenge;
- /**
- * size of the challenge
- */
- size_t challenge_size;
+ void *challenge;
+ /**
+ * size of the challenge
+ */
+ size_t challenge_size;
};
/**
@@ -711,7 +711,7 @@ ANASTASIS_policy_create (struct ANASTASIS_Truth *truths[],
for (unsigned int i = 0; i < truths_len; i++)
{
key_shares[i] = truths[i]->key_share;
- memcpy(uuids[i], truths[i]->uuid, sizeof(uuid_t));
+ memcpy (uuids[i], truths[i]->uuid, sizeof(uuid_t));
}
// FIXME SALT
ANASTASIS_CRYPTO_policy_key_derive (key_shares,
@@ -763,21 +763,21 @@ struct ANASTASIS_SecretShare
* Hash of the current upload.
*/
struct GNUNET_HashCode curr_hash;
- /**
- * Identity key material used for the derivation of keys
+ /**
+ * Identity key material used for the derivation of keys
+*/
+ struct ANASTASIS_CRYPTO_UserIdentifier id;
+ /**
+ * Public key for a request
+ */
+ struct ANASTASIS_CRYPTO_AccountPrivateKey priv_key;
+ /**
+ * Curl context
*/
- struct ANASTASIS_CRYPTO_UserIdentifier id;
- /**
- * Public key for a request
- */
- struct ANASTASIS_CRYPTO_AccountPrivateKey priv_key;
- /**
- * Curl context
- */
- struct GNUNET_CURL_Context *ctx;
- // FIXME not sure how to do payment
- int payment_requested;
- const char *payment_order_id;
+ struct GNUNET_CURL_Context *ctx;
+ // FIXME not sure how to do payment
+ int payment_requested;
+ const char *payment_order_id;
};
/**
@@ -786,13 +786,13 @@ struct ANASTASIS_SecretShare
*/
struct ANASTASIS_TruthMethod
{
- char *url;
- char *escrow_method;
- uuid_t uuid;
- struct ANASTASIS_CRYPTO_TruthKey truth_key;
- struct ANASTASIS_CRYPTO_Salt salt;
- void *challenge;
- size_t challenge_size;
+ char *url;
+ char *escrow_method;
+ uuid_t uuid;
+ struct ANASTASIS_CRYPTO_TruthKey truth_key;
+ struct ANASTASIS_CRYPTO_Salt salt;
+ void *challenge;
+ size_t challenge_size;
};
@@ -854,10 +854,10 @@ ANASTASIS_secret_share (const json_t *id_data,
{
policy_keys[i] = policies[i]->policy_key;
}
- //FIXME CHALLENGE
+ // FIXME CHALLENGE
for (unsigned int l = 0; l < truths_len; l++)
{
- memcpy(truth_methods[l].uuid, truths[l]->uuid, sizeof(uuid_t));
+ memcpy (truth_methods[l].uuid, truths[l]->uuid, sizeof(uuid_t));
truth_methods[l].url = truths[l]->url;
truth_methods[l].truth_key = truths[l]->truth_key;
truth_methods[l].salt = *truths[l]->salt;
@@ -878,15 +878,15 @@ ANASTASIS_secret_share (const json_t *id_data,
decryption_policies[j].escrow_uuids = policies[j]->uuids;
}
- //FIXME
+ // FIXME
recovery_document = json_pack (
- " s:[fmt]," /* escrow methods */
- " s:[fmt]," /* decryption policies */
- " s:o}", /* encrypted core secret */
- "escrow_methods", &truth_methods,
- "decryption_policies", &decryption_policies,
- "core_secret", GNUNET_JSON_from_data (
- core_secret, core_secret_size));
+ " s:[fmt]," /* escrow methods */
+ " s:[fmt]," /* decryption policies */
+ " s:o}", /* encrypted core secret */
+ "escrow_methods", &truth_methods,
+ "decryption_policies", &decryption_policies,
+ "core_secret", GNUNET_JSON_from_data (
+ core_secret, core_secret_size));
st->so = ANASTASIS_salt (ss->ctx,
truth_methods[0].url,
@@ -897,12 +897,12 @@ ANASTASIS_secret_share (const json_t *id_data,
&ss->id);
salt_cleanup (st);
- // ANASTASIS_CRYPTO_account_private_key_derive (&ss->id,
- // &ss->priv_key);
+ // ANASTASIS_CRYPTO_account_private_key_derive (&ss->id,
+ // &ss->priv_key);
ANASTASIS_CRYPTO_recovery_document_encrypt (&ss->id,
recovery_document,
- sizeof(recovery_document),//FIXME
+ sizeof(recovery_document),//
FIXME
&enc_rec_doc,
&enc_rec_doc_size);
--
To stop receiving notification emails like this one, please contact
address@hidden.
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [taler-anastasis] branch master updated: uncrustify,
gnunet <=