diff options
author | Florian Dold <florian.dold@gmail.com> | 2014-01-07 09:40:05 +0000 |
---|---|---|
committer | Florian Dold <florian.dold@gmail.com> | 2014-01-07 09:40:05 +0000 |
commit | 47a164b83ebd56bc13167a57bf38aeafe78d354b (patch) | |
tree | 6a69093ae491dcdcc39c0ea3ea54552ff20ff00d /src/secretsharing/gnunet-service-secretsharing.c | |
parent | f2d27a480dea985dc49f1b9fe7a57eb21ee18d42 (diff) | |
download | gnunet-47a164b83ebd56bc13167a57bf38aeafe78d354b.tar.gz gnunet-47a164b83ebd56bc13167a57bf38aeafe78d354b.zip |
missing secretsharing_common.c
Diffstat (limited to 'src/secretsharing/gnunet-service-secretsharing.c')
-rw-r--r-- | src/secretsharing/gnunet-service-secretsharing.c | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/src/secretsharing/gnunet-service-secretsharing.c b/src/secretsharing/gnunet-service-secretsharing.c index 29a8fc494..9298e38ad 100644 --- a/src/secretsharing/gnunet-service-secretsharing.c +++ b/src/secretsharing/gnunet-service-secretsharing.c | |||
@@ -1020,6 +1020,10 @@ insert_round1_element (struct KeygenSession *ks) | |||
1020 | element->data = d; | 1020 | element->data = d; |
1021 | element->size = sizeof *d; | 1021 | element->size = sizeof *d; |
1022 | 1022 | ||
1023 | GNUNET_log (GNUNET_ERROR_TYPE_INFO, "alloc'd size %u\n", sizeof *element + sizeof *d); | ||
1024 | GNUNET_log (GNUNET_ERROR_TYPE_INFO, "element size %u\n", element->size); | ||
1025 | |||
1026 | |||
1023 | d->peer = my_peer; | 1027 | d->peer = my_peer; |
1024 | 1028 | ||
1025 | GNUNET_assert (0 != (v = gcry_mpi_new (PAILLIER_BITS))); | 1029 | GNUNET_assert (0 != (v = gcry_mpi_new (PAILLIER_BITS))); |
@@ -1032,6 +1036,8 @@ insert_round1_element (struct KeygenSession *ks) | |||
1032 | 1036 | ||
1033 | GNUNET_CRYPTO_hash (v_data, PAILLIER_BITS / 8, &d->commitment); | 1037 | GNUNET_CRYPTO_hash (v_data, PAILLIER_BITS / 8, &d->commitment); |
1034 | 1038 | ||
1039 | /* | ||
1040 | |||
1035 | GNUNET_assert (0 == gcry_mpi_print (GCRYMPI_FMT_USG, | 1041 | GNUNET_assert (0 == gcry_mpi_print (GCRYMPI_FMT_USG, |
1036 | (unsigned char *) d->pubkey.g, PAILLIER_BITS / 8, NULL, | 1042 | (unsigned char *) d->pubkey.g, PAILLIER_BITS / 8, NULL, |
1037 | ks->info[ks->local_peer_idx].paillier_g)); | 1043 | ks->info[ks->local_peer_idx].paillier_g)); |
@@ -1040,6 +1046,8 @@ insert_round1_element (struct KeygenSession *ks) | |||
1040 | (unsigned char *) d->pubkey.n, PAILLIER_BITS / 8, NULL, | 1046 | (unsigned char *) d->pubkey.n, PAILLIER_BITS / 8, NULL, |
1041 | ks->info[ks->local_peer_idx].paillier_n)); | 1047 | ks->info[ks->local_peer_idx].paillier_n)); |
1042 | 1048 | ||
1049 | */ | ||
1050 | |||
1043 | d->purpose.size = htonl ((sizeof *d) - offsetof (struct GNUNET_SECRETSHARING_KeygenCommitData, purpose)); | 1051 | d->purpose.size = htonl ((sizeof *d) - offsetof (struct GNUNET_SECRETSHARING_KeygenCommitData, purpose)); |
1044 | d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1); | 1052 | d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1); |
1045 | GNUNET_assert (GNUNET_OK == GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, &d->purpose, &d->signature)); | 1053 | GNUNET_assert (GNUNET_OK == GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, &d->purpose, &d->signature)); |