diff options
author | Christian Fuchs <christian.fuchs@cfuchs.net> | 2014-01-29 14:34:33 +0000 |
---|---|---|
committer | Christian Fuchs <christian.fuchs@cfuchs.net> | 2014-01-29 14:34:33 +0000 |
commit | 0aaa309f73e803db075fef2e21176230563905da (patch) | |
tree | be311563342ed198a652b0ee4bb6e8a1f03b6654 /src/util/test_crypto_paillier.c | |
parent | 1d5ab4f4f4fe1d86a10cd9bd95464dcfbff3da8e (diff) | |
download | gnunet-0aaa309f73e803db075fef2e21176230563905da.tar.gz gnunet-0aaa309f73e803db075fef2e21176230563905da.zip |
- formatting
- forgot to reduce the possible homomorphic opts by one, as a badly chosen n might sometimes corrupt the final operation using a simple check. As the overall calculation of possible hom. opts is pessimist anyway and might become rather inaccurate if many operations are performed, reducing the prediction by one is acceptable.
Diffstat (limited to 'src/util/test_crypto_paillier.c')
-rw-r--r-- | src/util/test_crypto_paillier.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/util/test_crypto_paillier.c b/src/util/test_crypto_paillier.c index aaefd5ac0..2fe7b6de0 100644 --- a/src/util/test_crypto_paillier.c +++ b/src/util/test_crypto_paillier.c | |||
@@ -51,10 +51,10 @@ main (int argc, char *argv[]) | |||
51 | GNUNET_assert (NULL != (hom_result = gcry_mpi_new (0))); | 51 | GNUNET_assert (NULL != (hom_result = gcry_mpi_new (0))); |
52 | //gcry_mpi_randomize (m1, GNUNET_CRYPTO_PAILLIER_BITS-2, GCRY_WEAK_RANDOM); | 52 | //gcry_mpi_randomize (m1, GNUNET_CRYPTO_PAILLIER_BITS-2, GCRY_WEAK_RANDOM); |
53 | m1 = gcry_mpi_set_ui(m1,1); | 53 | m1 = gcry_mpi_set_ui(m1,1); |
54 | gcry_mpi_mul_2exp(m1,m1,GNUNET_CRYPTO_PAILLIER_BITS-2); | 54 | gcry_mpi_mul_2exp(m1,m1,GNUNET_CRYPTO_PAILLIER_BITS-3); |
55 | //gcry_mpi_randomize (m2, GNUNET_CRYPTO_PAILLIER_BITS-2, GCRY_WEAK_RANDOM); | 55 | //gcry_mpi_randomize (m2, GNUNET_CRYPTO_PAILLIER_BITS-2, GCRY_WEAK_RANDOM); |
56 | m2 = gcry_mpi_set_ui(m2,1); | 56 | m2 = gcry_mpi_set_ui(m2,1); |
57 | gcry_mpi_mul_2exp(m2,m2,GNUNET_CRYPTO_PAILLIER_BITS-2); | 57 | gcry_mpi_mul_2exp(m2,m2,GNUNET_CRYPTO_PAILLIER_BITS-3); |
58 | gcry_mpi_add(result,m1,m2); | 58 | gcry_mpi_add(result,m1,m2); |
59 | 59 | ||
60 | if (1 != (ret = GNUNET_CRYPTO_paillier_encrypt (&public_key, m1, &c1))){ | 60 | if (1 != (ret = GNUNET_CRYPTO_paillier_encrypt (&public_key, m1, &c1))){ |