diff options
author | noloader <noloader@57ff6487-cd31-0410-9ec3-f628ee90f5f0> | 2015-07-02 21:51:28 +0000 |
---|---|---|
committer | noloader <noloader@57ff6487-cd31-0410-9ec3-f628ee90f5f0> | 2015-07-02 21:51:28 +0000 |
commit | aa73b950fa096ac0e34a38976d2c4956c7f7d8e1 (patch) | |
tree | 841ad2f9e71670d797cfac888c8d52270bc25653 /rw.cpp | |
parent | e29b709a97502ac919356f528d74ccdcdf66b651 (diff) | |
download | cryptopp-aa73b950fa096ac0e34a38976d2c4956c7f7d8e1.tar.gz |
Fixed spelling error in attribution
git-svn-id: svn://svn.code.sf.net/p/cryptopp/code/trunk/c5@566 57ff6487-cd31-0410-9ec3-f628ee90f5f0
Diffstat (limited to 'rw.cpp')
-rw-r--r-- | rw.cpp | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -194,10 +194,10 @@ Integer InvertibleRWFunction::CalculateInverse(RandomNumberGenerator &rng, const // Do this in a loop for people using small numbers for testing r.Randomize(rng, Integer::One(), m_n - Integer::One()); // Fix for CVE-2015-2141. Thanks to Evgeny Sidorov for reporting. - // Squaring to satisfy Jacobi requirements suggested by Jean-Pierre Munch. + // Squaring to satisfy Jacobi requirements suggested by Jean-Pierre Muench. r = modn.Square(r); rInv = modn.MultiplicativeInverse(r); - } while(rInv.IsZero()); + } while (rInv.IsZero()); Integer re = modn.Square(r); re = modn.Multiply(re, x); // blind |