aboutsummaryrefslogtreecommitdiffstats
path: root/core/dkg-tsig-protocol.go
Commit message (Collapse)AuthorAgeFilesLines
* core: Add DKGSuccess (#569)Jimmy Hu2019-04-151-0/+11
| | | | | | * core: Add DKGSuccess * core: reset if not enough of dkg success
* core: fix rebroadcast anti nack complaint (#570)Jimmy Hu2019-04-151-2/+5
|
* core/crypto/dkg: concurrent access for gpk (#548)Jimmy Hu2019-04-041-1/+1
| | | | | * core/crypto/dkg: add benchmark * core/crypto/dkg: concurrent access for gpk
* core: optimize message handle (#542)Jimmy Hu2019-04-021-1/+1
| | | | | | | | * core: optimize for handling agremenet result * core: disable clone vote * core: touch npks
* core: abort hang DKG (#508)Mission Liao2019-03-221-0/+7
| | | | | | | | | | | | | | | | | | | | | | | * Capitalize log * Fix DKG aborting hangs Make sure reset cc.dkg to nil in runDKG * Remember to purge tsig verfier too * Replace abortCh with context.Context * Fix obvious bug * Fixup: forever blockin at Wait method when runDKG is not called * Fixup: fix corner case If the Add(1) moved to runDKG under cc.dkgLock, we may not catch it after unlocking cc.dkgLock. * fixup
* core: snapshot DKG protocol struct when finish any phase (#496)bojie2019-03-181-21/+70
|
* dkg: add reset field (#492)Mission Liao2019-03-171-4/+69
| | | | | | | | | | | | | | | | | | | | | | | | * Add Reset fields to DKG types * Fix crypto part after adding Reset field * Prohibit DKG messages with different resetCount * Add TODO * Add reset parameter to dkgProtocol constructor * Add TODO * Fix inconsist hash to prepare CRS * Add reset parameter when runnning DKG * Fix test for utils.RoundEvent * Add dummy test to prohibit DKG messages with unexpected reset count * Fix test.App
* core: recover DKG master private shares (#487)bojie2019-03-131-0/+30
|
* core: split GroupPublicKey and NodePublicKeys (#484)Jimmy Hu2019-03-121-9/+9
| | | | | | | | * core: add benchmark * core: split NPKs and GPK * Add benchmark
* core: move some dkg utils (#476)Mission Liao2019-03-111-116/+12
| | | | | | * Move core.getDKGThreshold to core.utils.GetDKGThreshold * Move core.DKGGroupPublicKey to typesDKG.GroupPublicKey
* core: check if self's privateShare match MPK registered (#474)Jimmy Hu2019-03-101-0/+32
| | | | | | * core: check if self's privateShare match MPK registered * add test
* big-bang: single chain (#446)Mission Liao2019-02-191-0/+2
|
* core: polish dkg for recovery (#443)Jimmy Hu2019-02-131-0/+10
| | | | | | | | * core: Add an error to NewGroupPublicKey * core: Add Delete to TSigVerifierCache * remove duplicated check
* core: fix DKG bug (#435)Jimmy Hu2019-01-271-0/+1
|
* misc: Add gosec to check security issues (#424)Jimmy Hu2019-01-181-3/+4
| | | | | | | | * Add gosec to tools * Run security check to ci * Fix secrity issues
* core/utils: Add Penalty checker and VerifyDKGComplaint (#393)Jimmy Hu2019-01-041-5/+1
| | | | | | | | | | * Add Util for checking penalty * Add VerifyDKGComplaints * Fixup and rename * Happy New Year!
* utils: move authenticator to utils package (#378)Mission Liao2018-12-221-10/+4
|
* core: Add a `MPKReady` so `MasterPublicKey` cannot be added afterwards (#375)Jimmy Hu2018-12-191-0/+10
| | | | | | | | | | | | | | | | * Add type DKGReady * Add DKGReady to interface and state * DKG will wait for MPK to be ready before running * Modify test * Check if self's MPK is registered * Add test for delay add MPK * Rename Ready to MPKReady
* misc: panic not ready (#374)Mission Liao2018-12-181-1/+2
| | | | | | | | | | | | | | | | * Panic when config/crs not ready For those calls to Governace.Configuration and Governance.CRS without checking returns, replace those calls with these newly added helpers: - utils.GetConfigurationWithPanic - utils.GetCRSWithPanic They would check returns, and panic directly if not ready yet. * Fix a bug that config is not ready when syncing
* core: Fix a bug of DKGNackComplaints (#370)Jimmy Hu2018-12-141-4/+9
| | | | | | * core: Fix a bug if DKGNackComplaint is added after required time. * Duplicated NackComplaint should be only count once.
* Rename repo to dexon-consensusWei-Ning Huang2018-11-021-10/+10
|
* core: Create an interface for TSigVerifierCache (#273)Jimmy Hu2018-10-301-7/+24
|
* core: Move dkg in types to types/dkg. (#253)Jimmy Hu2018-10-251-23/+24
|
* core: add round parameter to ProposeCRS method (#244)Wei-Ning Huang2018-10-231-0/+7
| | | | | | | | Since all DKG set members may ProposeCRS, but only one will get through, we need to be able to tell which round the CRS is intended for in order to skip CRS submission of the same round. Also this commit add check to make sure we have enough master public key when initializing DKGGroupPublicKey.
* core: sync compaction chain (#222)Jimmy Hu2018-10-181-0/+85
|
* core: Change DKG threshold (#204)Jimmy Hu2018-10-151-2/+2
|
* core: Add DKG final message. (#181)Jimmy Hu2018-10-091-0/+10
|
* core: General tsig (#177)Jimmy Hu2018-10-051-8/+5
|
* core: Prevent duplicated nack complaint (#162)Jimmy Hu2018-10-031-1/+9
|
* core: Export DKGGroupPublicKey and its verify function (#160)Jimmy Hu2018-10-021-7/+10
|
* test: Non-qualified node are accepted in test. (#154)Jimmy Hu2018-10-011-3/+3
|
* crypto: sigtopub to crypto package. remove SigToPubFn (#141)Jimmy Hu2018-09-261-11/+5
|
* core: move crypto to core/crypto (#140)Mission Liao2018-09-261-2/+2
| | | | | | | | | - Move key-holder to authenticator Make core.keyHolder public as core.Authenticator, it is not required to make this part an interface. - Make private when there is no need to go public. - Fix data race
* core: run TSIG for first configuration block at startup (#135)Jimmy Hu2018-09-261-3/+16
|
* core: run first DKG at startup. (#129)Jimmy Hu2018-09-231-0/+5
|
* core: add anti-complaint and nack-complaint to dkg protocol (#123)Jimmy Hu2018-09-211-21/+98
|
* Rename validator* to node* (#120)Mission Liao2018-09-201-28/+28
|
* core: Nack Complaint (#116)Jimmy Hu2018-09-191-0/+20
|
* core:DKG and TSIG protocol (#115)Jimmy Hu2018-09-191-0/+341