@@ -236,19 +236,14 @@ pub fn round3_min(
236
236
round1_frost_packages : Vec < & [ u8 ] > ,
237
237
round2_frost_packages : Vec < & [ u8 ] > ,
238
238
gsk_bytes : Vec < & [ u8 ] > ,
239
- min_signers : u16 ,
240
- ) -> Result < ( KeyPackage , PublicKeyPackage , GroupSecretKey ) , IronfishFrostError > {
239
+ ) -> Result < ( KeyPackage , FrostPublicKeyPackage , GroupSecretKey ) , IronfishFrostError > {
241
240
let round2_secret_package = import_secret_package ( round2_secret_package, secret) ?;
242
241
243
- let mut identities: Vec < Identity > = Vec :: with_capacity ( participants. len ( ) + 1 ) ;
244
- identities. push ( secret. to_identity ( ) ) ;
245
-
246
242
let mut round1_packages = BTreeMap :: new ( ) ;
247
243
let mut round2_packages = BTreeMap :: new ( ) ;
248
244
249
245
for i in 0 ..participants. len ( ) {
250
246
let identity = Identity :: deserialize_from ( participants[ i] ) ?;
251
- identities. push ( identity. clone ( ) ) ;
252
247
253
248
let identifier = identity. to_frost_identifier ( ) ;
254
249
@@ -262,9 +257,6 @@ pub fn round3_min(
262
257
let ( key_package, public_key_package) =
263
258
part3 ( & round2_secret_package, & round1_packages, & round2_packages) ?;
264
259
265
- let public_key_package =
266
- PublicKeyPackage :: from_frost ( public_key_package, identities, min_signers) ;
267
-
268
260
let mut gsk_shards: Vec < GroupSecretKeyShard > = Vec :: with_capacity ( participants. len ( ) + 1 ) ;
269
261
for g in gsk_bytes {
270
262
gsk_shards. push ( GroupSecretKeyShard :: import ( secret, g) ?) ;
@@ -602,7 +594,6 @@ mod tests {
602
594
round1_frost_packages,
603
595
round2_frost_packages,
604
596
gsk_bytes,
605
- 2 ,
606
597
)
607
598
. expect ( "round 3 failed" ) ;
608
599
}
0 commit comments