aboutsummaryrefslogtreecommitdiff
path: root/src/secretsharing/gnunet-service-secretsharing.c
diff options
context:
space:
mode:
authorFlorian Dold <florian.dold@gmail.com>2014-01-07 09:40:05 +0000
committerFlorian Dold <florian.dold@gmail.com>2014-01-07 09:40:05 +0000
commit47a164b83ebd56bc13167a57bf38aeafe78d354b (patch)
tree6a69093ae491dcdcc39c0ea3ea54552ff20ff00d /src/secretsharing/gnunet-service-secretsharing.c
parentf2d27a480dea985dc49f1b9fe7a57eb21ee18d42 (diff)
downloadgnunet-47a164b83ebd56bc13167a57bf38aeafe78d354b.tar.gz
gnunet-47a164b83ebd56bc13167a57bf38aeafe78d354b.zip
missing secretsharing_common.c
Diffstat (limited to 'src/secretsharing/gnunet-service-secretsharing.c')
-rw-r--r--src/secretsharing/gnunet-service-secretsharing.c8
1 files changed, 8 insertions, 0 deletions
diff --git a/src/secretsharing/gnunet-service-secretsharing.c b/src/secretsharing/gnunet-service-secretsharing.c
index 29a8fc494..9298e38ad 100644
--- a/src/secretsharing/gnunet-service-secretsharing.c
+++ b/src/secretsharing/gnunet-service-secretsharing.c
@@ -1020,6 +1020,10 @@ insert_round1_element (struct KeygenSession *ks)
1020 element->data = d; 1020 element->data = d;
1021 element->size = sizeof *d; 1021 element->size = sizeof *d;
1022 1022
1023 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "alloc'd size %u\n", sizeof *element + sizeof *d);
1024 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "element size %u\n", element->size);
1025
1026
1023 d->peer = my_peer; 1027 d->peer = my_peer;
1024 1028
1025 GNUNET_assert (0 != (v = gcry_mpi_new (PAILLIER_BITS))); 1029 GNUNET_assert (0 != (v = gcry_mpi_new (PAILLIER_BITS)));
@@ -1032,6 +1036,8 @@ insert_round1_element (struct KeygenSession *ks)
1032 1036
1033 GNUNET_CRYPTO_hash (v_data, PAILLIER_BITS / 8, &d->commitment); 1037 GNUNET_CRYPTO_hash (v_data, PAILLIER_BITS / 8, &d->commitment);
1034 1038
1039 /*
1040
1035 GNUNET_assert (0 == gcry_mpi_print (GCRYMPI_FMT_USG, 1041 GNUNET_assert (0 == gcry_mpi_print (GCRYMPI_FMT_USG,
1036 (unsigned char *) d->pubkey.g, PAILLIER_BITS / 8, NULL, 1042 (unsigned char *) d->pubkey.g, PAILLIER_BITS / 8, NULL,
1037 ks->info[ks->local_peer_idx].paillier_g)); 1043 ks->info[ks->local_peer_idx].paillier_g));
@@ -1040,6 +1046,8 @@ insert_round1_element (struct KeygenSession *ks)
1040 (unsigned char *) d->pubkey.n, PAILLIER_BITS / 8, NULL, 1046 (unsigned char *) d->pubkey.n, PAILLIER_BITS / 8, NULL,
1041 ks->info[ks->local_peer_idx].paillier_n)); 1047 ks->info[ks->local_peer_idx].paillier_n));
1042 1048
1049 */
1050
1043 d->purpose.size = htonl ((sizeof *d) - offsetof (struct GNUNET_SECRETSHARING_KeygenCommitData, purpose)); 1051 d->purpose.size = htonl ((sizeof *d) - offsetof (struct GNUNET_SECRETSHARING_KeygenCommitData, purpose));
1044 d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1); 1052 d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1);
1045 GNUNET_assert (GNUNET_OK == GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, &d->purpose, &d->signature)); 1053 GNUNET_assert (GNUNET_OK == GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, &d->purpose, &d->signature));