diff options
author | Florian Dold <florian.dold@gmail.com> | 2014-01-07 00:30:34 +0000 |
---|---|---|
committer | Florian Dold <florian.dold@gmail.com> | 2014-01-07 00:30:34 +0000 |
commit | 76beae90a99f628085bb220c92683e2590b6c615 (patch) | |
tree | 6e05fc13f8253d1084fc384f990eb6aab03de86a /src/secretsharing | |
parent | 1155d3ee358c33bb091776e56c5229f59ec61ea2 (diff) | |
download | gnunet-76beae90a99f628085bb220c92683e2590b6c615.tar.gz gnunet-76beae90a99f628085bb220c92683e2590b6c615.zip |
- htons => htonl
Diffstat (limited to 'src/secretsharing')
-rw-r--r-- | src/secretsharing/gnunet-service-secretsharing.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/secretsharing/gnunet-service-secretsharing.c b/src/secretsharing/gnunet-service-secretsharing.c index 6c91343d5..e38303ff0 100644 --- a/src/secretsharing/gnunet-service-secretsharing.c +++ b/src/secretsharing/gnunet-service-secretsharing.c | |||
@@ -668,7 +668,7 @@ keygen_round1_new_element (void *cls, | |||
668 | } | 668 | } |
669 | 669 | ||
670 | if (d->purpose.size != | 670 | if (d->purpose.size != |
671 | htons (element->size - offsetof (struct GNUNET_SECRETSHARING_KeygenCommitData, purpose))) | 671 | htonl (element->size - offsetof (struct GNUNET_SECRETSHARING_KeygenCommitData, purpose))) |
672 | { | 672 | { |
673 | GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "keygen commit data with wrong signature purpose size in consensus\n"); | 673 | GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "keygen commit data with wrong signature purpose size in consensus\n"); |
674 | return; | 674 | return; |
@@ -858,8 +858,8 @@ insert_round2_element (struct KeygenSession *ks) | |||
858 | pos += PAILLIER_BITS / 8; | 858 | pos += PAILLIER_BITS / 8; |
859 | } | 859 | } |
860 | 860 | ||
861 | d->purpose.size = htons (element_size - offsetof (struct GNUNET_SECRETSHARING_KeygenRevealData, purpose)); | 861 | d->purpose.size = htonl (element_size - offsetof (struct GNUNET_SECRETSHARING_KeygenRevealData, purpose)); |
862 | d->purpose.purpose = htons (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG2); | 862 | d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG2); |
863 | GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, &d->purpose, &d->signature); | 863 | GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, &d->purpose, &d->signature); |
864 | 864 | ||
865 | GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL); | 865 | GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL); |
@@ -1040,8 +1040,8 @@ insert_round1_element (struct KeygenSession *ks) | |||
1040 | (unsigned char *) d->pubkey.n, PAILLIER_BITS / 8, NULL, | 1040 | (unsigned char *) d->pubkey.n, PAILLIER_BITS / 8, NULL, |
1041 | ks->info[ks->local_peer_idx].paillier_n)); | 1041 | ks->info[ks->local_peer_idx].paillier_n)); |
1042 | 1042 | ||
1043 | d->purpose.size = htons ((sizeof *d) - offsetof (struct GNUNET_SECRETSHARING_KeygenCommitData, purpose)); | 1043 | d->purpose.size = htonl ((sizeof *d) - offsetof (struct GNUNET_SECRETSHARING_KeygenCommitData, purpose)); |
1044 | d->purpose.purpose = htons (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1); | 1044 | d->purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_SECRETSHARING_DKG1); |
1045 | GNUNET_assert (GNUNET_OK == GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, &d->purpose, &d->signature)); | 1045 | GNUNET_assert (GNUNET_OK == GNUNET_CRYPTO_eddsa_sign (my_peer_private_key, &d->purpose, &d->signature)); |
1046 | 1046 | ||
1047 | GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL); | 1047 | GNUNET_CONSENSUS_insert (ks->consensus, element, NULL, NULL); |