remove stale TODOs (#431)
This commit is contained in:
parent
404cc361fd
commit
b8ca1678a4
|
@ -148,8 +148,6 @@ where
|
|||
}
|
||||
}
|
||||
|
||||
// TODO: pub struct Lagrange<C: Ciphersuite>(Scalar);
|
||||
|
||||
/// Generates the lagrange coefficient for the i'th participant.
|
||||
#[cfg_attr(feature = "internals", visibility::make(pub))]
|
||||
fn derive_interpolating_value<C: Ciphersuite>(
|
||||
|
@ -161,9 +159,6 @@ fn derive_interpolating_value<C: Ciphersuite>(
|
|||
let mut num = <<C::Group as Group>::Field>::one();
|
||||
let mut den = <<C::Group as Group>::Field>::one();
|
||||
|
||||
// Ala the sorting of B, just always sort by identifier in ascending order
|
||||
//
|
||||
// https://github.com/cfrg/draft-irtf-cfrg-frost/blob/master/draft-irtf-cfrg-frost.md#encoding-operations-dep-encoding
|
||||
for commitment_identifier in signing_package.signing_commitments().keys() {
|
||||
if *commitment_identifier == *signer_id {
|
||||
continue;
|
||||
|
@ -178,7 +173,6 @@ fn derive_interpolating_value<C: Ciphersuite>(
|
|||
return Err(Error::DuplicatedShares);
|
||||
}
|
||||
|
||||
// TODO(dconnolly): return this error if the inversion result == zero
|
||||
let lagrange_coeff = num * <<C::Group as Group>::Field>::invert(&den).unwrap();
|
||||
|
||||
Ok(lagrange_coeff)
|
||||
|
|
|
@ -346,11 +346,6 @@ pub(super) fn encode_group_commitments<C: Ciphersuite>(
|
|||
/// perform the first round. Batching entails generating more than one
|
||||
/// nonce/commitment pair at a time. Nonces should be stored in secret storage
|
||||
/// for later use, whereas the commitments are published.
|
||||
///
|
||||
/// The number of nonces is limited to 255. This limit can be increased if it
|
||||
/// turns out to be too conservative.
|
||||
// TODO: Make sure the above is a correct statement, fix if needed in:
|
||||
// https://github.com/ZcashFoundation/redjubjub/issues/111
|
||||
pub fn preprocess<C, R>(
|
||||
num_nonces: u8,
|
||||
secret: &SigningShare<C>,
|
||||
|
|
|
@ -118,9 +118,9 @@ impl Group for P256Group {
|
|||
// Sanity check; either it takes all bytes or a single byte (identity).
|
||||
assert!(serialized.len() == fixed_serialized.len() || serialized.len() == 1);
|
||||
// Copy to the left of the buffer (i.e. pad the identity with zeroes).
|
||||
// TODO: Note that identity elements shouldn't be serialized in FROST. This will likely become
|
||||
// part of the API and when that happens, we should return an error instead of
|
||||
// doing this padding.
|
||||
// Note that identity elements shouldn't be serialized in FROST, but we
|
||||
// do this padding so that this function doesn't have to return an error.
|
||||
// If this encodes the identity, it will fail when deserializing.
|
||||
{
|
||||
let (left, _right) = fixed_serialized.split_at_mut(serialized.len());
|
||||
left.copy_from_slice(serialized);
|
||||
|
@ -135,7 +135,7 @@ impl Group for P256Group {
|
|||
match Option::<AffinePoint>::from(AffinePoint::from_encoded_point(&encoded_point)) {
|
||||
Some(point) => {
|
||||
if point.is_identity().into() {
|
||||
// This is actually impossible since the identity is encoded a a single byte
|
||||
// This is actually impossible since the identity is encoded in a single byte
|
||||
// which will never happen since we receive a 33-byte buffer.
|
||||
// We leave the check for consistency.
|
||||
Err(GroupError::InvalidIdentityElement)
|
||||
|
|
|
@ -117,11 +117,10 @@ impl Group for Secp256K1Group {
|
|||
let serialized = serialized_point.as_bytes();
|
||||
// Sanity check; either it takes all bytes or a single byte (identity).
|
||||
assert!(serialized.len() == fixed_serialized.len() || serialized.len() == 1);
|
||||
|
||||
// Copy to the left of the buffer (i.e. pad the identity with zeroes).
|
||||
// TODO: Note that identity elements shouldn't be serialized in FROST. This will likely become
|
||||
// part of the API and when that happens, we should return an error instead of
|
||||
// doing this padding.
|
||||
// Note that identity elements shouldn't be serialized in FROST, but we
|
||||
// do this padding so that this function doesn't have to return an error.
|
||||
// If this encodes the identity, it will fail when deserializing.
|
||||
{
|
||||
let (left, _right) = fixed_serialized.split_at_mut(serialized.len());
|
||||
left.copy_from_slice(serialized);
|
||||
|
|
Loading…
Reference in New Issue