exchange

Base system with REST service to issue digital coins, run by the payment service provider
Log | Files | Refs | Submodules | README | LICENSE

commit cdcd67a27dc7da0016628782437e0c189b3e9782
parent 7958464696f6451252ff0ae5bc42716e2326f8c4
Author: Jeff Burdges <burdges@gnunet.org>
Date:   Mon,  8 Aug 2016 12:43:59 +0200

Use KDF better

We now send the secret_seed to the skm variable, while sending the
counter salt to the xts variable.  I have not check this with
http://eprint.iacr.org/2010/264 but it seems correct.

Indeed rsa_blinding_key_derive places the strong source of
randomness in skm too, and uses a constant string for xts.

Diffstat:
Msrc/util/crypto.c | 4++--
1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/src/util/crypto.c b/src/util/crypto.c @@ -187,10 +187,10 @@ TALER_setup_fresh_coin (const struct TALER_TransferSecretP *secret_seed, GNUNET_assert (GNUNET_OK == GNUNET_CRYPTO_kdf (fc, sizeof (*fc), - secret_seed, - sizeof (*secret_seed), &be_salt, sizeof (be_salt), + secret_seed, + sizeof (*secret_seed), "taler-coin-derivation", strlen ("taler-coin-derivation"), NULL, 0));