aboutsummaryrefslogtreecommitdiff
path: root/src/util/test_crypto_paillier.c
diff options
context:
space:
mode:
authorChristian Fuchs <christian.fuchs@cfuchs.net>2014-01-29 14:34:33 +0000
committerChristian Fuchs <christian.fuchs@cfuchs.net>2014-01-29 14:34:33 +0000
commit0aaa309f73e803db075fef2e21176230563905da (patch)
treebe311563342ed198a652b0ee4bb6e8a1f03b6654 /src/util/test_crypto_paillier.c
parent1d5ab4f4f4fe1d86a10cd9bd95464dcfbff3da8e (diff)
downloadgnunet-0aaa309f73e803db075fef2e21176230563905da.tar.gz
gnunet-0aaa309f73e803db075fef2e21176230563905da.zip
- formatting
- forgot to reduce the possible homomorphic opts by one, as a badly chosen n might sometimes corrupt the final operation using a simple check. As the overall calculation of possible hom. opts is pessimist anyway and might become rather inaccurate if many operations are performed, reducing the prediction by one is acceptable.
Diffstat (limited to 'src/util/test_crypto_paillier.c')
-rw-r--r--src/util/test_crypto_paillier.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/util/test_crypto_paillier.c b/src/util/test_crypto_paillier.c
index aaefd5ac0..2fe7b6de0 100644
--- a/src/util/test_crypto_paillier.c
+++ b/src/util/test_crypto_paillier.c
@@ -51,10 +51,10 @@ main (int argc, char *argv[])
51 GNUNET_assert (NULL != (hom_result = gcry_mpi_new (0))); 51 GNUNET_assert (NULL != (hom_result = gcry_mpi_new (0)));
52 //gcry_mpi_randomize (m1, GNUNET_CRYPTO_PAILLIER_BITS-2, GCRY_WEAK_RANDOM); 52 //gcry_mpi_randomize (m1, GNUNET_CRYPTO_PAILLIER_BITS-2, GCRY_WEAK_RANDOM);
53 m1 = gcry_mpi_set_ui(m1,1); 53 m1 = gcry_mpi_set_ui(m1,1);
54 gcry_mpi_mul_2exp(m1,m1,GNUNET_CRYPTO_PAILLIER_BITS-2); 54 gcry_mpi_mul_2exp(m1,m1,GNUNET_CRYPTO_PAILLIER_BITS-3);
55 //gcry_mpi_randomize (m2, GNUNET_CRYPTO_PAILLIER_BITS-2, GCRY_WEAK_RANDOM); 55 //gcry_mpi_randomize (m2, GNUNET_CRYPTO_PAILLIER_BITS-2, GCRY_WEAK_RANDOM);
56 m2 = gcry_mpi_set_ui(m2,1); 56 m2 = gcry_mpi_set_ui(m2,1);
57 gcry_mpi_mul_2exp(m2,m2,GNUNET_CRYPTO_PAILLIER_BITS-2); 57 gcry_mpi_mul_2exp(m2,m2,GNUNET_CRYPTO_PAILLIER_BITS-3);
58 gcry_mpi_add(result,m1,m2); 58 gcry_mpi_add(result,m1,m2);
59 59
60 if (1 != (ret = GNUNET_CRYPTO_paillier_encrypt (&public_key, m1, &c1))){ 60 if (1 != (ret = GNUNET_CRYPTO_paillier_encrypt (&public_key, m1, &c1))){