diff options
author | Nick Mathewson <nickm@torproject.org> | 2006-04-10 21:23:00 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2006-04-10 21:23:00 +0000 |
commit | 1fbc74661f6b47d452e58eac22c3e55f90d692c2 (patch) | |
tree | c8ea4526dc7cd2d30a2dabde459f63222c2b40da /src/or | |
parent | 37c77c71f798cdbd2b7b06e178772640a4516747 (diff) | |
download | tor-1fbc74661f6b47d452e58eac22c3e55f90d692c2.tar.gz tor-1fbc74661f6b47d452e58eac22c3e55f90d692c2.zip |
Remove DER64 functions in trunk: they will never be used again unless the directory authorities switch back to 0.0.9tooearly.
svn:r6376
Diffstat (limited to 'src/or')
-rw-r--r-- | src/or/routerparse.c | 8 | ||||
-rw-r--r-- | src/or/test.c | 13 |
2 files changed, 0 insertions, 21 deletions
diff --git a/src/or/routerparse.c b/src/or/routerparse.c index 2efd7b6f4a..bb30d1c0a4 100644 --- a/src/or/routerparse.c +++ b/src/or/routerparse.c @@ -540,14 +540,6 @@ find_dir_signing_key(const char *str) if (tok->key) { key = tok->key; tok->key = NULL; /* steal reference. */ - } else if (tok->n_args >= 1) { - /** XXXX Once all the directories are running 0.1.0.6-rc or later, we - * can remove this logic. */ - key = crypto_pk_DER64_decode_public_key(tok->args[0]); - if (!key) { - log_warn(LD_DIR, "Unparseable dir-signing-key argument"); - return NULL; - } } else { log_warn(LD_DIR, "Dir-signing-key token contained no key"); return NULL; diff --git a/src/or/test.c b/src/or/test.c index 6cb6c8d375..2fff4d7097 100644 --- a/src/or/test.c +++ b/src/or/test.c @@ -416,19 +416,6 @@ test_crypto(void) test_eq(0, crypto_pk_cmp_keys(pk1, pk2)); tor_free(cp); - /* Check DER encoding */ - i=crypto_pk_DER64_encode_public_key(pk1, &cp); - test_assert(i>0); - test_assert(cp); - test_assert(!strchr(cp, ' ')); - test_assert(!strchr(cp, '\n')); - test_eq(0, crypto_pk_cmp_keys(pk1, pk1)); - crypto_free_pk_env(pk2); - pk2 = crypto_pk_DER64_decode_public_key(cp); - test_assert(pk2); - test_eq(0, crypto_pk_cmp_keys(pk1, pk2)); - tor_free(cp); - test_eq(128, crypto_pk_keysize(pk1)); test_eq(128, crypto_pk_keysize(pk2)); |