Use KDF better
We now send the secret_seed to the skm variable, while sending the counter salt to the xts variable. I have not check this with http://eprint.iacr.org/2010/264 but it seems correct. Indeed rsa_blinding_key_derive places the strong source of randomness in skm too, and uses a constant string for xts.
This commit is contained in:
parent
7958464696
commit
cdcd67a27d
@ -187,10 +187,10 @@ TALER_setup_fresh_coin (const struct TALER_TransferSecretP *secret_seed,
|
|||||||
GNUNET_assert (GNUNET_OK ==
|
GNUNET_assert (GNUNET_OK ==
|
||||||
GNUNET_CRYPTO_kdf (fc,
|
GNUNET_CRYPTO_kdf (fc,
|
||||||
sizeof (*fc),
|
sizeof (*fc),
|
||||||
secret_seed,
|
|
||||||
sizeof (*secret_seed),
|
|
||||||
&be_salt,
|
&be_salt,
|
||||||
sizeof (be_salt),
|
sizeof (be_salt),
|
||||||
|
secret_seed,
|
||||||
|
sizeof (*secret_seed),
|
||||||
"taler-coin-derivation",
|
"taler-coin-derivation",
|
||||||
strlen ("taler-coin-derivation"),
|
strlen ("taler-coin-derivation"),
|
||||||
NULL, 0));
|
NULL, 0));
|
||||||
|
Loading…
Reference in New Issue
Block a user