diff options
author | Christian Grothoff <christian@grothoff.org> | 2020-04-08 16:56:33 +0200 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2020-04-08 16:56:33 +0200 |
commit | 11ae9f030e13d07c505a4d5477d592ddb4b3acf6 (patch) | |
tree | 69ce120a7c60c84d0d074bab8fe2cd26e77300dc /src/secretsharing | |
parent | 2348fe4ae8ffe93765d5c56c3cc5d4490eae946d (diff) | |
download | gnunet-11ae9f030e13d07c505a4d5477d592ddb4b3acf6.tar.gz gnunet-11ae9f030e13d07c505a4d5477d592ddb4b3acf6.zip |
fix sign api for to address #6164
Diffstat (limited to 'src/secretsharing')
-rw-r--r-- | src/secretsharing/gnunet-service-secretsharing.c | 24 |
1 files changed, 12 insertions, 12 deletions
diff --git a/src/secretsharing/gnunet-service-secretsharing.c b/src/secretsharing/gnunet-service-secretsharing.c index d2e47da8b..2177134f6 100644 --- a/src/secretsharing/gnunet-service-secretsharing.c +++ b/src/secretsharing/gnunet-service-secretsharing.c | |||
@@ -679,7 +679,7 @@ generate_presecret_polynomial (struct KeygenSession *ks) | |||
679 | for (i = 0; i < ks->threshold; i++) | 679 | for (i = 0; i < ks->threshold; i++) |
680 | { | 680 | { |
681 | v = ks->presecret_polynomial[i] = gcry_mpi_new ( | 681 | v = ks->presecret_polynomial[i] = gcry_mpi_new ( |
682 | GNUNET_SECRETSHARING_ELGAMAL_BITS); | 682 | GNUNET_SECRETSHARING_ELGAMAL_BITS); |
683 | GNUNET_assert (NULL != v); | 683 | GNUNET_assert (NULL != v); |
684 | // Randomize v such that 0 < v < elgamal_q. | 684 | // Randomize v such that 0 < v < elgamal_q. |
685 | // The '- 1' is necessary as bitlength(q) = bitlength(p) - 1. | 685 | // The '- 1' is necessary as bitlength(q) = bitlength(p) - 1. |
@@ -750,7 +750,7 @@ keygen_round1_new_element (void *cls, | |||
750 | return; | 750 | return; |
751 | } | 751 | } |
752 | 752 | ||
753 | if (GNUNET_OK != GNUNET_CRYPTO_eddsa_verify ( | 753 | if (GNUNET_OK != GNUNET_CRYPTO_eddsa_verify_ ( |
754 | GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1, | 754 | GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1, |
755 | &d->purpose, &d->signature, | 755 | &d->purpose, &d->signature, |
756 | &d->peer.public_key)) | 756 | &d->peer.public_key)) |
@@ -1341,9 +1341,9 @@ insert_round2_element (struct KeygenSession *ks) | |||
1341 | purpose)); | 1341 | purpose)); |
1342 | d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG2); | 1342 | d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG2); |
1343 | GNUNET_assert (GNUNET_OK == | 1343 | GNUNET_assert (GNUNET_OK == |
1344 | GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, | 1344 | GNUNET_CRYPTO_eddsa_sign_ (my_peer_private_key, |
1345 | &d->purpose, | 1345 | &d->purpose, |
1346 | &d->signature)); | 1346 | &d->signature)); |
1347 | 1347 | ||
1348 | GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL); | 1348 | GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL); |
1349 | GNUNET_free (element); /* FIXME: maybe stack-allocate instead? */ | 1349 | GNUNET_free (element); /* FIXME: maybe stack-allocate instead? */ |
@@ -1485,7 +1485,7 @@ keygen_round2_new_element (void *cls, | |||
1485 | return; | 1485 | return; |
1486 | } | 1486 | } |
1487 | 1487 | ||
1488 | if (GNUNET_OK != GNUNET_CRYPTO_eddsa_verify ( | 1488 | if (GNUNET_OK != GNUNET_CRYPTO_eddsa_verify_ ( |
1489 | GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG2, | 1489 | GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG2, |
1490 | &d->purpose, &d->signature, | 1490 | &d->purpose, &d->signature, |
1491 | &d->peer.public_key)) | 1491 | &d->peer.public_key)) |
@@ -1687,9 +1687,9 @@ insert_round1_element (struct KeygenSession *ks) | |||
1687 | purpose)); | 1687 | purpose)); |
1688 | d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1); | 1688 | d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1); |
1689 | GNUNET_assert (GNUNET_OK == | 1689 | GNUNET_assert (GNUNET_OK == |
1690 | GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, | 1690 | GNUNET_CRYPTO_eddsa_sign_ (my_peer_private_key, |
1691 | &d->purpose, | 1691 | &d->purpose, |
1692 | &d->signature)); | 1692 | &d->signature)); |
1693 | 1693 | ||
1694 | GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL); | 1694 | GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL); |
1695 | 1695 | ||
@@ -2189,9 +2189,9 @@ insert_decrypt_element (struct DecryptSession *ds) | |||
2189 | d.purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DECRYPTION); | 2189 | d.purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DECRYPTION); |
2190 | 2190 | ||
2191 | GNUNET_assert (GNUNET_OK == | 2191 | GNUNET_assert (GNUNET_OK == |
2192 | GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, | 2192 | GNUNET_CRYPTO_eddsa_sign_ (my_peer_private_key, |
2193 | &d.purpose, | 2193 | &d.purpose, |
2194 | &d.signature)); | 2194 | &d.signature)); |
2195 | 2195 | ||
2196 | GNUNET_CONSENSUS_insert (ds->consensus, &element, NULL, NULL); | 2196 | GNUNET_CONSENSUS_insert (ds->consensus, &element, NULL, NULL); |
2197 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, | 2197 | GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, |