API change in GNUnet crypto for Full Domain Hashing

This commit is contained in:
Jeff Burdges 2016-03-20 21:30:10 +01:00
parent 6f8fa678c1
commit 553d6eb23e
4 changed files with 18 additions and 18 deletions

View File

@ -453,9 +453,9 @@ execute_reserve_withdraw_transaction (struct MHD_Connection *connection,
/* Balance is good, sign the coin! */ /* Balance is good, sign the coin! */
denom_sig->rsa_signature denom_sig->rsa_signature
= GNUNET_CRYPTO_rsa_sign (dki->denom_priv.rsa_private_key, = GNUNET_CRYPTO_rsa_sign_blinded (dki->denom_priv.rsa_private_key,
blinded_msg, blinded_msg,
blinded_msg_len); blinded_msg_len);
if (NULL == denom_sig->rsa_signature) if (NULL == denom_sig->rsa_signature)
{ {
GNUNET_break (0); GNUNET_break (0);
@ -1112,9 +1112,9 @@ refresh_exchange_coin (struct MHD_Connection *connection,
return ev_sig; return ev_sig;
} }
ev_sig.rsa_signature ev_sig.rsa_signature
= GNUNET_CRYPTO_rsa_sign (dki->denom_priv.rsa_private_key, = GNUNET_CRYPTO_rsa_sign_blinded (dki->denom_priv.rsa_private_key,
commit_coin->coin_ev, commit_coin->coin_ev,
commit_coin->coin_ev_size); commit_coin->coin_ev_size);
if (NULL == ev_sig.rsa_signature) if (NULL == ev_sig.rsa_signature)
{ {
GNUNET_break (0); GNUNET_break (0);

View File

@ -495,9 +495,9 @@ TMH_TEST_handler_test_rsa_sign (struct TMH_RequestHandler *rh,
return TMH_RESPONSE_reply_internal_error (connection, return TMH_RESPONSE_reply_internal_error (connection,
"Failed to create RSA key"); "Failed to create RSA key");
} }
sig = GNUNET_CRYPTO_rsa_sign (rsa_pk, sig = GNUNET_CRYPTO_rsa_sign_blinded (rsa_pk,
in_ptr, in_ptr,
in_ptr_size); in_ptr_size);
if (NULL == sig) if (NULL == sig)
{ {
GNUNET_break (0); GNUNET_break (0);

View File

@ -351,9 +351,9 @@ PERF_TALER_EXCHANGEDB_coin_init (
coin->public_info.denom_pub.rsa_public_key = coin->public_info.denom_pub.rsa_public_key =
GNUNET_CRYPTO_rsa_public_key_dup (dki->denom_pub.rsa_public_key); GNUNET_CRYPTO_rsa_public_key_dup (dki->denom_pub.rsa_public_key);
coin->public_info.denom_sig.rsa_signature = coin->public_info.denom_sig.rsa_signature =
GNUNET_CRYPTO_rsa_sign (dki->denom_priv.rsa_private_key, GNUNET_CRYPTO_rsa_sign_fdh (dki->denom_priv.rsa_private_key,
&coin->public_info.coin_pub, &coin->public_info.coin_pub,
sizeof (struct TALER_CoinSpendPublicKeyP)); sizeof (struct TALER_CoinSpendPublicKeyP));
GNUNET_assert (NULL != coin->public_info.denom_pub.rsa_public_key); GNUNET_assert (NULL != coin->public_info.denom_pub.rsa_public_key);
GNUNET_assert (NULL != coin->public_info.denom_sig.rsa_signature); GNUNET_assert (NULL != coin->public_info.denom_sig.rsa_signature);

View File

@ -337,9 +337,9 @@ test_melting (struct TALER_EXCHANGEDB_Session *session)
{ {
RND_BLK (&melts[cnt].coin.coin_pub); RND_BLK (&melts[cnt].coin.coin_pub);
melts[cnt].coin.denom_sig.rsa_signature = melts[cnt].coin.denom_sig.rsa_signature =
GNUNET_CRYPTO_rsa_sign (dkp->priv.rsa_private_key, GNUNET_CRYPTO_rsa_sign_fdh (dkp->priv.rsa_private_key,
&melts[cnt].coin.coin_pub, &melts[cnt].coin.coin_pub,
sizeof (melts[cnt].coin.coin_pub)); sizeof (melts[cnt].coin.coin_pub));
melts[cnt].coin.denom_pub = dkp->pub; melts[cnt].coin.denom_pub = dkp->pub;
RND_BLK (&melts[cnt].coin_sig); RND_BLK (&melts[cnt].coin_sig);
melts[cnt].session_hash = session_hash; melts[cnt].session_hash = session_hash;
@ -663,9 +663,9 @@ run (void *cls,
RND_BLK(&cbc.reserve_sig); RND_BLK(&cbc.reserve_sig);
cbc.denom_pub = dkp->pub; cbc.denom_pub = dkp->pub;
cbc.sig.rsa_signature cbc.sig.rsa_signature
= GNUNET_CRYPTO_rsa_sign (dkp->priv.rsa_private_key, = GNUNET_CRYPTO_rsa_sign_fdh (dkp->priv.rsa_private_key,
&cbc.h_coin_envelope, &cbc.h_coin_envelope,
sizeof (cbc.h_coin_envelope)); sizeof (cbc.h_coin_envelope));
cbc.reserve_pub = reserve_pub; cbc.reserve_pub = reserve_pub;
cbc.amount_with_fee = value; cbc.amount_with_fee = value;
GNUNET_assert (GNUNET_OK == GNUNET_assert (GNUNET_OK ==