diff --git a/CMakeLists.txt b/CMakeLists.txt index bcaaefd9ff1ab656731af2b61957dcc045782950..c4fcc8f9a428891e832b939520fd8c53ba61b4e6 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -2,7 +2,7 @@ project(cellframe-sdk C) cmake_minimum_required(VERSION 2.8) set(CMAKE_C_STANDARD 11) -set(CELLFRAME_SDK_NATIVE_VERSION "2.4-3") +set(CELLFRAME_SDK_NATIVE_VERSION "2.5-0") add_definitions ("-DCELLFRAME_SDK_VERSION=\"${CELLFRAME_SDK_NATIVE_VERSION}\"") set(DAPSDK_MODULES "") diff --git a/dap-sdk/crypto/src/dap_cert.c b/dap-sdk/crypto/src/dap_cert.c index 2916d19b6707d73da4597d8231f928bc3d99400e..b9bc42688635fe060bd631c36eb9c7d60f9a03d0 100755 --- a/dap-sdk/crypto/src/dap_cert.c +++ b/dap-sdk/crypto/src/dap_cert.c @@ -207,11 +207,11 @@ dap_cert_t * dap_cert_generate_mem_with_seed(const char * a_cert_name, dap_enc_k if ( l_enc_key ){ dap_cert_t * l_cert = dap_cert_new(a_cert_name); l_cert->enc_key = l_enc_key; - log_it(L_DEBUG,"Certificate generated"); + //log_it(L_DEBUG,"Certificate generated"); //dap_cert_item_t * l_cert_item = DAP_NEW_Z(dap_cert_item_t); //snprintf(l_cert_item->name,sizeof(l_cert_item->name),"%s",a_cert_name); //HASH_ADD_STR(s_certs,name,l_cert_item); - log_it(L_DEBUG,"Certificate name %s recorded", a_cert_name); + //log_it(L_DEBUG,"Certificate name %s recorded", a_cert_name); return l_cert; } else { log_it(L_ERROR,"Can't generate key in memory!"); diff --git a/dap-sdk/crypto/src/dap_cert_file.c b/dap-sdk/crypto/src/dap_cert_file.c index cad1955c2d228d65d6a7e3399cfe6f212950b8d5..7a733e50b6550763a24c1940f5c96fdba8b97c7e 100755 --- a/dap-sdk/crypto/src/dap_cert_file.c +++ b/dap-sdk/crypto/src/dap_cert_file.c @@ -238,15 +238,15 @@ uint8_t* dap_cert_mem_save(dap_cert_t * a_cert, uint32_t *a_cert_size_out) l_hdr.type = dap_cert_FILE_TYPE_PUBLIC; if ( l_priv_key_data ){ l_hdr.type = dap_cert_FILE_TYPE_PRIVATE; - log_it(L_DEBUG,"Private key size %u",l_priv_key_data_size); + //log_it(L_DEBUG,"Private key size %u",l_priv_key_data_size); } if (l_pub_key_data){ - log_it(L_DEBUG,"Public key size %u",l_pub_key_data_size); + //log_it(L_DEBUG,"Public key size %u",l_pub_key_data_size); }else{ log_it(L_ERROR,"No public or private key in certificate, nothing to save"); goto lb_exit; } - log_it(L_DEBUG,"Key private data size %u",l_key->_inheritor_size); + //log_it(L_DEBUG,"Key private data size %u",l_key->_inheritor_size); l_hdr.version = dap_cert_FILE_VERSION; l_hdr.data_size = l_pub_key_data_size; @@ -290,7 +290,7 @@ lb_exit: DAP_DELETE(l_metadata); } - log_it(L_NOTICE,"Certificate \"%s\" successfully serialized",a_cert->name); + //log_it(L_NOTICE,"Certificate \"%s\" successfully serialized",a_cert->name); if(a_cert_size_out) *a_cert_size_out = l_data_offset; @@ -378,7 +378,7 @@ dap_cert_t* dap_cert_mem_load(const void * a_data, size_t a_data_size) l_data_offset += l_hdr.metadata_size; } dap_enc_key_update(l_ret->enc_key); - log_it(L_NOTICE,"Successfully loaded certificate %s", l_ret->name); + //log_it(L_NOTICE,"Successfully loaded certificate %s", l_ret->name); }else log_it(L_ERROR,"Unrecognizable certificate version, corrupted file or you have too old software");