diff options
-rw-r--r-- | src/lib/exchange_api_refresh_common.c | 8 | ||||
-rw-r--r-- | src/util/crypto.c | 5 |
2 files changed, 13 insertions, 0 deletions
diff --git a/src/lib/exchange_api_refresh_common.c b/src/lib/exchange_api_refresh_common.c index 8891377eb..b901bab32 100644 --- a/src/lib/exchange_api_refresh_common.c +++ b/src/lib/exchange_api_refresh_common.c @@ -146,6 +146,14 @@ TALER_EXCHANGE_get_melt_data_ ( TALER_planchet_blinding_secret_create (fc, &alg_values[j], &bks); + /* Note: we already did this for the /csr request, + so this computation is redundant, and here additionally + repeated KAPPA times. Could be avoided with slightly + more bookkeeping in the future */ + TALER_cs_refresh_nonce_derive ( + ps, + j, + &pd.blinded_planchet.details.cs_blinded_planchet.nonce); if (GNUNET_OK != TALER_planchet_prepare (&md->fresh_pks[j], &alg_values[j], diff --git a/src/util/crypto.c b/src/util/crypto.c index 5a7dbfeee..614b008c5 100644 --- a/src/util/crypto.c +++ b/src/util/crypto.c @@ -476,6 +476,11 @@ TALER_refresh_get_commitment (struct TALER_RefreshCommitmentP *rc, { const struct TALER_RefreshCoinData *rcd = &rce->new_coins[j]; + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, + "BCH %u/%u %s\n", + i, j, + TALER_B2S ( + &rcd->blinded_planchet.details.cs_blinded_planchet)); TALER_blinded_planchet_hash (&rcd->blinded_planchet, hash_context); } |