@@ -51,7 +51,8 @@ void CMNAuth::PushMNAUTH(CNode& peer, CConnman& connman, const CActiveMasternode
5151
5252 mnauth.proRegTxHash = mn_activeman.GetProTxHash ();
5353
54- mnauth.sig = mn_activeman.Sign (signHash, bls::bls_legacy_scheme.load ());
54+ // all clients uses basic BLS
55+ mnauth.sig = mn_activeman.Sign (signHash, false );
5556
5657 LogPrint (BCLog::NET_NETCONN, " CMNAuth::%s -- Sending MNAUTH, peer=%d\n " , __func__, peer.GetId ());
5758 connman.PushMessage (&peer, CNetMsgMaker (peer.GetCommonVersion ()).Make (NetMsgType::MNAUTH, mnauth));
@@ -86,7 +87,8 @@ PeerMsgRet CMNAuth::ProcessMessage(CNode& peer, ServiceFlags node_services, CCon
8687 }
8788
8889 if (!mnauth.sig .IsValid ()) {
89- LogPrint (BCLog::NET_NETCONN, " CMNAuth::ProcessMessage -- invalid mnauth for protx=%s with sig=%s\n " , mnauth.proRegTxHash .ToString (), mnauth.sig .ToString ());
90+ LogPrint (BCLog::NET_NETCONN, " CMNAuth::ProcessMessage -- invalid mnauth for protx=%s with sig=%s\n " ,
91+ mnauth.proRegTxHash .ToString (), mnauth.sig .ToString (false ));
9092 return tl::unexpected{MisbehavingError{100 , " invalid mnauth signature" }};
9193 }
9294
@@ -112,7 +114,7 @@ PeerMsgRet CMNAuth::ProcessMessage(CNode& peer, ServiceFlags node_services, CCon
112114 }
113115 LogPrint (BCLog::NET_NETCONN, " CMNAuth::%s -- constructed signHash for nVersion %d, peer=%d\n " , __func__, peer.nVersion , peer.GetId ());
114116
115- if (!mnauth.sig .VerifyInsecure (dmn->pdmnState ->pubKeyOperator .Get (), signHash)) {
117+ if (!mnauth.sig .VerifyInsecure (dmn->pdmnState ->pubKeyOperator .Get (), signHash, false )) {
116118 // Same as above, MN seems to not know its fate yet, so give it a chance to update. If this is a
117119 // malicious node (DoSing us), it'll get banned soon.
118120 return tl::unexpected{MisbehavingError{10 , " mnauth signature verification failed" }};
0 commit comments