aboutsummaryrefslogtreecommitdiff
path: root/src/secretsharing
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2020-04-08 16:56:33 +0200
committerChristian Grothoff <christian@grothoff.org>2020-04-08 16:56:33 +0200
commit11ae9f030e13d07c505a4d5477d592ddb4b3acf6 (patch)
tree69ce120a7c60c84d0d074bab8fe2cd26e77300dc /src/secretsharing
parent2348fe4ae8ffe93765d5c56c3cc5d4490eae946d (diff)
downloadgnunet-11ae9f030e13d07c505a4d5477d592ddb4b3acf6.tar.gz
gnunet-11ae9f030e13d07c505a4d5477d592ddb4b3acf6.zip
fix sign api for to address #6164
Diffstat (limited to 'src/secretsharing')
-rw-r--r--src/secretsharing/gnunet-service-secretsharing.c24
1 files changed, 12 insertions, 12 deletions
diff --git a/src/secretsharing/gnunet-service-secretsharing.c b/src/secretsharing/gnunet-service-secretsharing.c
index d2e47da8b..2177134f6 100644
--- a/src/secretsharing/gnunet-service-secretsharing.c
+++ b/src/secretsharing/gnunet-service-secretsharing.c
@@ -679,7 +679,7 @@ generate_presecret_polynomial (struct KeygenSession *ks)
679 for (i = 0; i < ks->threshold; i++) 679 for (i = 0; i < ks->threshold; i++)
680 { 680 {
681 v = ks->presecret_polynomial[i] = gcry_mpi_new ( 681 v = ks->presecret_polynomial[i] = gcry_mpi_new (
682 GNUNET_SECRETSHARING_ELGAMAL_BITS); 682 GNUNET_SECRETSHARING_ELGAMAL_BITS);
683 GNUNET_assert (NULL != v); 683 GNUNET_assert (NULL != v);
684 // Randomize v such that 0 < v < elgamal_q. 684 // Randomize v such that 0 < v < elgamal_q.
685 // The '- 1' is necessary as bitlength(q) = bitlength(p) - 1. 685 // The '- 1' is necessary as bitlength(q) = bitlength(p) - 1.
@@ -750,7 +750,7 @@ keygen_round1_new_element (void *cls,
750 return; 750 return;
751 } 751 }
752 752
753 if (GNUNET_OK != GNUNET_CRYPTO_eddsa_verify ( 753 if (GNUNET_OK != GNUNET_CRYPTO_eddsa_verify_ (
754 GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1, 754 GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1,
755 &d->purpose, &d->signature, 755 &d->purpose, &d->signature,
756 &d->peer.public_key)) 756 &d->peer.public_key))
@@ -1341,9 +1341,9 @@ insert_round2_element (struct KeygenSession *ks)
1341 purpose)); 1341 purpose));
1342 d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG2); 1342 d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG2);
1343 GNUNET_assert (GNUNET_OK == 1343 GNUNET_assert (GNUNET_OK ==
1344 GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, 1344 GNUNET_CRYPTO_eddsa_sign_ (my_peer_private_key,
1345 &d->purpose, 1345 &d->purpose,
1346 &d->signature)); 1346 &d->signature));
1347 1347
1348 GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL); 1348 GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL);
1349 GNUNET_free (element); /* FIXME: maybe stack-allocate instead? */ 1349 GNUNET_free (element); /* FIXME: maybe stack-allocate instead? */
@@ -1485,7 +1485,7 @@ keygen_round2_new_element (void *cls,
1485 return; 1485 return;
1486 } 1486 }
1487 1487
1488 if (GNUNET_OK != GNUNET_CRYPTO_eddsa_verify ( 1488 if (GNUNET_OK != GNUNET_CRYPTO_eddsa_verify_ (
1489 GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG2, 1489 GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG2,
1490 &d->purpose, &d->signature, 1490 &d->purpose, &d->signature,
1491 &d->peer.public_key)) 1491 &d->peer.public_key))
@@ -1687,9 +1687,9 @@ insert_round1_element (struct KeygenSession *ks)
1687 purpose)); 1687 purpose));
1688 d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1); 1688 d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1);
1689 GNUNET_assert (GNUNET_OK == 1689 GNUNET_assert (GNUNET_OK ==
1690 GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, 1690 GNUNET_CRYPTO_eddsa_sign_ (my_peer_private_key,
1691 &d->purpose, 1691 &d->purpose,
1692 &d->signature)); 1692 &d->signature));
1693 1693
1694 GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL); 1694 GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL);
1695 1695
@@ -2189,9 +2189,9 @@ insert_decrypt_element (struct DecryptSession *ds)
2189 d.purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DECRYPTION); 2189 d.purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DECRYPTION);
2190 2190
2191 GNUNET_assert (GNUNET_OK == 2191 GNUNET_assert (GNUNET_OK ==
2192 GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, 2192 GNUNET_CRYPTO_eddsa_sign_ (my_peer_private_key,
2193 &d.purpose, 2193 &d.purpose,
2194 &d.signature)); 2194 &d.signature));
2195 2195
2196 GNUNET_CONSENSUS_insert (ds->consensus, &element, NULL, NULL); 2196 GNUNET_CONSENSUS_insert (ds->consensus, &element, NULL, NULL);
2197 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, 2197 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,