diff options
author | Christian Fuchs <christian.fuchs@cfuchs.net> | 2014-02-04 10:15:29 +0000 |
---|---|---|
committer | Christian Fuchs <christian.fuchs@cfuchs.net> | 2014-02-04 10:15:29 +0000 |
commit | 9728378c983196c86c2fc6b7902964955e41e379 (patch) | |
tree | 1ecd82f008f053fc7bccf7dc0b331dc6a5db2a0e /src/util/test_crypto_paillier.c | |
parent | 3a831d404fdb12a6b8aa4c34f04d9c96ac032a03 (diff) | |
download | gnunet-9728378c983196c86c2fc6b7902964955e41e379.tar.gz gnunet-9728378c983196c86c2fc6b7902964955e41e379.zip |
- extended paillier-api to also include caller-suggested maximum supported homs
Diffstat (limited to 'src/util/test_crypto_paillier.c')
-rw-r--r-- | src/util/test_crypto_paillier.c | 8 |
1 files changed, 3 insertions, 5 deletions
diff --git a/src/util/test_crypto_paillier.c b/src/util/test_crypto_paillier.c index b77100642..0dad500ba 100644 --- a/src/util/test_crypto_paillier.c +++ b/src/util/test_crypto_paillier.c | |||
@@ -45,7 +45,7 @@ test_crypto () | |||
45 | 45 | ||
46 | gcry_mpi_randomize (plaintext, GNUNET_CRYPTO_PAILLIER_BITS / 2, GCRY_WEAK_RANDOM); | 46 | gcry_mpi_randomize (plaintext, GNUNET_CRYPTO_PAILLIER_BITS / 2, GCRY_WEAK_RANDOM); |
47 | 47 | ||
48 | GNUNET_CRYPTO_paillier_encrypt (&public_key, plaintext, &ciphertext); | 48 | GNUNET_CRYPTO_paillier_encrypt (&public_key, plaintext, 0, &ciphertext); |
49 | 49 | ||
50 | GNUNET_CRYPTO_paillier_decrypt (&private_key, &public_key, | 50 | GNUNET_CRYPTO_paillier_decrypt (&private_key, &public_key, |
51 | &ciphertext, plaintext_result); | 51 | &ciphertext, plaintext_result); |
@@ -88,16 +88,14 @@ test_hom() | |||
88 | gcry_mpi_mul_2exp(m2,m2,GNUNET_CRYPTO_PAILLIER_BITS-3); | 88 | gcry_mpi_mul_2exp(m2,m2,GNUNET_CRYPTO_PAILLIER_BITS-3); |
89 | gcry_mpi_add(result,m1,m2); | 89 | gcry_mpi_add(result,m1,m2); |
90 | 90 | ||
91 | if (1 != (ret = GNUNET_CRYPTO_paillier_encrypt (&public_key, m1, &c1))){ | 91 | if (1 != (ret = GNUNET_CRYPTO_paillier_encrypt (&public_key, m1, 0, &c1))){ |
92 | printf ("GNUNET_CRYPTO_paillier_encrypt 1 failed, should return 1 allowed operation, got %d!\n", ret); | 92 | printf ("GNUNET_CRYPTO_paillier_encrypt 1 failed, should return 1 allowed operation, got %d!\n", ret); |
93 | return 1; | 93 | return 1; |
94 | } | 94 | } |
95 | if (1 != (ret = GNUNET_CRYPTO_paillier_encrypt (&public_key, m2, &c2))){ | 95 | if (1 != (ret = GNUNET_CRYPTO_paillier_encrypt (&public_key, m2, 0, &c2))){ |
96 | printf ("GNUNET_CRYPTO_paillier_encrypt 2 failed, should return 1 allowed operation, got %d!\n", ret); | 96 | printf ("GNUNET_CRYPTO_paillier_encrypt 2 failed, should return 1 allowed operation, got %d!\n", ret); |
97 | return 1; | 97 | return 1; |
98 | } | 98 | } |
99 | |||
100 | GNUNET_CRYPTO_paillier_encrypt (&public_key, m2, &c2); | ||
101 | 99 | ||
102 | if (0 != (ret = GNUNET_CRYPTO_paillier_hom_add (&public_key, &c1,&c2, &c_result))){ | 100 | if (0 != (ret = GNUNET_CRYPTO_paillier_hom_add (&public_key, &c1,&c2, &c_result))){ |
103 | printf ("GNUNET_CRYPTO_paillier_hom_add failed, expected 0 remaining operations, got %d!\n", ret); | 101 | printf ("GNUNET_CRYPTO_paillier_hom_add failed, expected 0 remaining operations, got %d!\n", ret); |