diff options
author | warptangent <warptangent@inbox.com> | 2014-11-07 13:37:41 -0800 |
---|---|---|
committer | warptangent <warptangent@inbox.com> | 2014-12-01 13:35:09 -0800 |
commit | 21a3c46a1b422514a375334da172074afe69b7fd (patch) | |
tree | a81ca889765386e9d0675d93f1d46f260c2eaff9 | |
parent | Merge pull request #192 (diff) | |
download | monero-21a3c46a1b422514a375334da172074afe69b7fd.tar.xz |
ensure that keccak is called on view spend key, not a possibly pre-sc_reduce32 version of it
- for deriving view secret key
-rw-r--r-- | src/cryptonote_core/account.cpp | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/cryptonote_core/account.cpp b/src/cryptonote_core/account.cpp index 36043238d..9f6c91026 100644 --- a/src/cryptonote_core/account.cpp +++ b/src/cryptonote_core/account.cpp @@ -65,7 +65,7 @@ DISABLE_VS_WARNINGS(4244 4345) // rng for generating second set of keys is hash of first rng. means only one set of electrum-style words needed for recovery crypto::secret_key second; - keccak((uint8_t *)&first, sizeof(crypto::secret_key), (uint8_t *)&second, sizeof(crypto::secret_key)); + keccak((uint8_t *)&m_keys.m_spend_secret_key, sizeof(crypto::secret_key), (uint8_t *)&second, sizeof(crypto::secret_key)); generate_keys(m_keys.m_account_address.m_view_public_key, m_keys.m_view_secret_key, second, two_random ? false : true); |