aboutsummaryrefslogtreecommitdiff
path: root/src/secretsharing
diff options
context:
space:
mode:
authorFlorian Dold <florian.dold@gmail.com>2014-01-07 00:30:34 +0000
committerFlorian Dold <florian.dold@gmail.com>2014-01-07 00:30:34 +0000
commit76beae90a99f628085bb220c92683e2590b6c615 (patch)
tree6e05fc13f8253d1084fc384f990eb6aab03de86a /src/secretsharing
parent1155d3ee358c33bb091776e56c5229f59ec61ea2 (diff)
downloadgnunet-76beae90a99f628085bb220c92683e2590b6c615.tar.gz
gnunet-76beae90a99f628085bb220c92683e2590b6c615.zip
- htons => htonl
Diffstat (limited to 'src/secretsharing')
-rw-r--r--src/secretsharing/gnunet-service-secretsharing.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/src/secretsharing/gnunet-service-secretsharing.c b/src/secretsharing/gnunet-service-secretsharing.c
index 6c91343d5..e38303ff0 100644
--- a/src/secretsharing/gnunet-service-secretsharing.c
+++ b/src/secretsharing/gnunet-service-secretsharing.c
@@ -668,7 +668,7 @@ keygen_round1_new_element (void *cls,
668 } 668 }
669 669
670 if (d->purpose.size != 670 if (d->purpose.size !=
671 htons (element->size - offsetof (struct GNUNET_SECRETSHARING_KeygenCommitData, purpose))) 671 htonl (element->size - offsetof (struct GNUNET_SECRETSHARING_KeygenCommitData, purpose)))
672 { 672 {
673 GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "keygen commit data with wrong signature purpose size in consensus\n"); 673 GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "keygen commit data with wrong signature purpose size in consensus\n");
674 return; 674 return;
@@ -858,8 +858,8 @@ insert_round2_element (struct KeygenSession *ks)
858 pos += PAILLIER_BITS / 8; 858 pos += PAILLIER_BITS / 8;
859 } 859 }
860 860
861 d->purpose.size = htons (element_size - offsetof (struct GNUNET_SECRETSHARING_KeygenRevealData, purpose)); 861 d->purpose.size = htonl (element_size - offsetof (struct GNUNET_SECRETSHARING_KeygenRevealData, purpose));
862 d->purpose.purpose = htons (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG2); 862 d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG2);
863 GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, &d->purpose, &d->signature); 863 GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, &d->purpose, &d->signature);
864 864
865 GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL); 865 GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL);
@@ -1040,8 +1040,8 @@ insert_round1_element (struct KeygenSession *ks)
1040 (unsigned char *) d->pubkey.n, PAILLIER_BITS / 8, NULL, 1040 (unsigned char *) d->pubkey.n, PAILLIER_BITS / 8, NULL,
1041 ks->info[ks->local_peer_idx].paillier_n)); 1041 ks->info[ks->local_peer_idx].paillier_n));
1042 1042
1043 d->purpose.size = htons ((sizeof *d) - offsetof (struct GNUNET_SECRETSHARING_KeygenCommitData, purpose)); 1043 d->purpose.size = htonl ((sizeof *d) - offsetof (struct GNUNET_SECRETSHARING_KeygenCommitData, purpose));
1044 d->purpose.purpose = htons (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1); 1044 d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1);
1045 GNUNET_assert (GNUNET_OK == GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, &d->purpose, &d->signature)); 1045 GNUNET_assert (GNUNET_OK == GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, &d->purpose, &d->signature));
1046 1046
1047 GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL); 1047 GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL);