gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] r36951 - gnunet/src/util


From: gnunet
Subject: [GNUnet-SVN] r36951 - gnunet/src/util
Date: Mon, 21 Mar 2016 15:40:06 +0100

Author: burdges
Date: 2016-03-21 15:40:06 +0100 (Mon, 21 Mar 2016)
New Revision: 36951

Modified:
   gnunet/src/util/crypto_rsa.c
Log:
Authors, (C), and C++ comments



Modified: gnunet/src/util/crypto_rsa.c
===================================================================
--- gnunet/src/util/crypto_rsa.c        2016-03-21 14:29:11 UTC (rev 36950)
+++ gnunet/src/util/crypto_rsa.c        2016-03-21 14:40:06 UTC (rev 36951)
@@ -1,6 +1,6 @@
 /*
   This file is part of GNUnet
-  Copyright (C) 2014 GNUnet e.V.
+  Copyright (C) 2016 GNUnet e.V.
 
   GNUnet is free software; you can redistribute it and/or modify it under the
   terms of the GNU General Public License as published by the Free Software
@@ -19,6 +19,7 @@
  * @brief Chaum-style Blind signatures based on RSA
  * @author Sree Harsha Totakura <address@hidden>
  * @author Christian Grothoff
+ * @author Jeffrey Burdges <address@hidden>
  */
 #include "platform.h"
 #include <gcrypt.h>
@@ -692,10 +693,10 @@
   if (0 != rc)
     return rc;
 
-  // We seed with the public denomination key as a homage to RSA-PSS by
-  // Mihir Bellare and Phillip Rogaway.  Doing this lowers the degree
-  // of the hypothetical polyomial-time attack on RSA-KTI created by a
-  // polynomial-time one-more forgary attack.  Yey seeding!
+  /* We seed with the public denomination key as a homage to RSA-PSS by  *
+   * Mihir Bellare and Phillip Rogaway.  Doing this lowers the degree    *
+   * of the hypothetical polyomial-time attack on RSA-KTI created by a   *
+   * polynomial-time one-more forgary attack.  Yey seeding!              */
   buf_len = GNUNET_CRYPTO_rsa_public_key_encode (pkey, &buf);
   gcry_md_write (h, buf, buf_len);
   GNUNET_free (buf);
@@ -734,9 +735,9 @@
   if (0 != rc)
     return rc;
 
-  // Do not allow *r to exceed n or signatures fail to verify unpredictably.
-  // This happening with  gcry_mpi_clear_highbit (*r, nbits-1) so maybe
-  // gcry_mpi_clear_highbit is broken, but setting the highbit sounds good.
+  /* Do not allow *r to exceed n or signatures fail to verify unpredictably. *
+   * This happening with  gcry_mpi_clear_highbit (*r, nbits-1) so maybe      *
+   * gcry_mpi_clear_highbit is broken, but setting the highbit sounds good.  */
   gcry_mpi_set_highbit (*r, nbits-2);
   return rc;
 }
@@ -777,7 +778,7 @@
   }
 
   rc = rsa_full_domain_hash (&data, hash, pkey, &rsize);
-  if (0 != rc)  // Allocation error in libgcrypt
+  if (0 != rc)  /* Allocation error in libgcrypt */
   {
     GNUNET_break (0);
     gcry_mpi_release (ne[0]);
@@ -1131,7 +1132,7 @@
   int rc;
 
   rc = rsa_full_domain_hash (&r, hash, pkey, NULL);
-  GNUNET_assert (0 == rc);  // Allocation error in libgcrypt
+  GNUNET_assert (0 == rc);  /* Allocation error in libgcrypt */
   data = mpi_to_sexp(r);
   gcry_mpi_release (r);
 




reply via email to

[Prev in Thread] Current Thread [Next in Thread]