diff --git a/applications/tokenboard/tokenboard_integration_test.go b/applications/tokenboard/tokenboard_integration_test.go index 333ac25..0374dda 100644 --- a/applications/tokenboard/tokenboard_integration_test.go +++ b/applications/tokenboard/tokenboard_integration_test.go @@ -10,7 +10,6 @@ import ( "git.openprivacy.ca/openprivacy/connectivity" torProvider "git.openprivacy.ca/openprivacy/connectivity/tor" "git.openprivacy.ca/openprivacy/log" - "io/ioutil" "os" "runtime" "sync" @@ -78,7 +77,7 @@ func TestTokenBoardApp(t *testing.T) { builder.WithSocksPort(9059).WithControlPort(9060).WithHashedPassword("tapir-integration-test").Build("./tor/torrc") torDataDir := "" var err error - if torDataDir, err = ioutil.TempDir("./tor/", "data-dir-"); err != nil { + if torDataDir, err = os.MkdirTemp("./tor/", "data-dir-"); err != nil { t.Fatalf("could not create data dir") } diff --git a/primitives/auditable/auditablestore.go b/primitives/auditable/auditablestore.go index df26759..8475f9f 100644 --- a/primitives/auditable/auditablestore.go +++ b/primitives/auditable/auditablestore.go @@ -25,7 +25,6 @@ type State struct { Messages []Message } -// const ( auditableDataStoreProtocol = "auditable-data-store" newMessage = "new-message" diff --git a/primitives/core/transcript.go b/primitives/core/transcript.go index bccd6f1..ef47c0c 100644 --- a/primitives/core/transcript.go +++ b/primitives/core/transcript.go @@ -12,8 +12,8 @@ import ( // Transcript provides a consistent transcript primitive for our protocols // // We have the following goals: -// - Allow sequential proofs over a common transcript (ensuring a single proof cannot be extracted standalone) -// - be able to produce a human-readable transcript for auditing. +// - Allow sequential proofs over a common transcript (ensuring a single proof cannot be extracted standalone) +// - be able to produce a human-readable transcript for auditing. // // The design of this API was inspired by Merlin: https://docs.rs/crate/merlin/ type Transcript struct { diff --git a/primitives/privacypass/dlogeq.go b/primitives/privacypass/dlogeq.go index 2694771..cf3dafb 100644 --- a/primitives/privacypass/dlogeq.go +++ b/primitives/privacypass/dlogeq.go @@ -7,7 +7,7 @@ import ( ) // DLEQProof encapsulates a Chaum-Pedersen DLEQ Proof -//gut In Ernest F. Brickell, editor,CRYPTO’92,volume 740 ofLNCS, pages 89–105. Springer, Heidelberg,August 1993 +// gut In Ernest F. Brickell, editor,CRYPTO’92,volume 740 ofLNCS, pages 89–105. Springer, Heidelberg,August 1993 type DLEQProof struct { C *ristretto.Scalar S *ristretto.Scalar @@ -16,10 +16,11 @@ type DLEQProof struct { // DiscreteLogEquivalenceProof constructs a valid DLEQProof for the given parameters and transcript // Given Y = kX & Q = kP // Peggy: t := choose randomly from Zq -// A := tX -// B := tP -// c := H(transcript(X,Y,P,Q,A,B)) -// s := (t + ck) mod q +// +// A := tX +// B := tP +// c := H(transcript(X,Y,P,Q,A,B)) +// s := (t + ck) mod q // // Sends c,s to Vicky func DiscreteLogEquivalenceProof(k *ristretto.Scalar, X *ristretto.Element, Y *ristretto.Element, P *ristretto.Element, Q *ristretto.Element, transcript *core.Transcript) DLEQProof { @@ -47,12 +48,14 @@ func DiscreteLogEquivalenceProof(k *ristretto.Scalar, X *ristretto.Element, Y *r // VerifyDiscreteLogEquivalenceProof verifies the DLEQ for the given parameters and transcript // Given Y = kX & Q = kP and Proof = (c,s) // Vicky: X' := sX -// Y' := cY -// P' := sP -// Q' := cQ -// A' = X'+Y' == sX + cY ?= sG + ckG == (s+ck)X == tX == A -// B' = P'+Q' == sP + cQ ?= sP + ckP == (s+ck)P == tP == B -// c' := H(transcript(X,Y,P,Q,A',B')) +// +// Y' := cY +// P' := sP +// Q' := cQ +// A' = X'+Y' == sX + cY ?= sG + ckG == (s+ck)X == tX == A +// B' = P'+Q' == sP + cQ ?= sP + ckP == (s+ck)P == tP == B +// c' := H(transcript(X,Y,P,Q,A',B')) +// // Tests c ?= c func VerifyDiscreteLogEquivalenceProof(dleq DLEQProof, X *ristretto.Element, Y *ristretto.Element, P *ristretto.Element, Q *ristretto.Element, transcript *core.Transcript) bool { diff --git a/testing/tapir_integration_test.go b/testing/tapir_integration_test.go index 582cb25..4615a41 100644 --- a/testing/tapir_integration_test.go +++ b/testing/tapir_integration_test.go @@ -9,7 +9,6 @@ import ( torProvider "git.openprivacy.ca/openprivacy/connectivity/tor" "git.openprivacy.ca/openprivacy/log" "golang.org/x/crypto/ed25519" - "io/ioutil" "os" "runtime" "runtime/pprof" @@ -69,7 +68,7 @@ func TestTapir(t *testing.T) { torDataDir := "" var err error - if torDataDir, err = ioutil.TempDir("./tor/", "data-dir-"); err != nil { + if torDataDir, err = os.MkdirTemp("./tor/", "data-dir-"); err != nil { t.Fatalf("could not create data dir") } diff --git a/testing/tapir_malicious_remote_integration_test.go b/testing/tapir_malicious_remote_integration_test.go index bf8488b..04fb6ef 100644 --- a/testing/tapir_malicious_remote_integration_test.go +++ b/testing/tapir_malicious_remote_integration_test.go @@ -8,7 +8,6 @@ import ( torProvider "git.openprivacy.ca/openprivacy/connectivity/tor" "git.openprivacy.ca/openprivacy/log" "golang.org/x/crypto/ed25519" - "io/ioutil" "os" "runtime" "sync" @@ -30,7 +29,7 @@ func TestTapirMaliciousRemote(t *testing.T) { torDataDir := "" var err error - if torDataDir, err = ioutil.TempDir("./tor/", "data-dir-"); err != nil { + if torDataDir, err = os.MkdirTemp("./tor/", "data-dir-"); err != nil { t.Fatalf("could not create data dir") }