From 3bbb5d321d26e8fc65e531196384e5a0430593a6 Mon Sep 17 00:00:00 2001 From: Rudolf Polzer Date: Fri, 29 Apr 2011 14:26:26 +0200 Subject: [PATCH] turn off the check debugger --- d0_blind_id.c | 3 +-- main.c | 2 +- 2 files changed, 2 insertions(+), 3 deletions(-) diff --git a/d0_blind_id.c b/d0_blind_id.c index bc61029..a02aaa7 100644 --- a/d0_blind_id.c +++ b/d0_blind_id.c @@ -97,8 +97,7 @@ struct d0_blind_id_s size_t msglen; // message length }; -#define CHECKDEBUG - +//#define CHECKDEBUG #ifdef CHECKDEBUG #define CHECK(x) do { if(!(x)) { fprintf(stderr, "CHECK FAILED (%s:%d): %s\n", __FILE__, __LINE__, #x); goto fail; } } while(0) #define CHECK_ASSIGN(var, value) do { d0_bignum_t *val; val = value; if(!val) { fprintf(stderr, "CHECK FAILED (%s:%d): %s\n", __FILE__, __LINE__, #value); goto fail; } var = val; } while(0) diff --git a/main.c b/main.c index 2be45cb..bc39797 100644 --- a/main.c +++ b/main.c @@ -83,7 +83,7 @@ int main(int argc, char **argv) ctx_other = d0_blind_id_new(); printf("keygen RSA...\n"); - if(!d0_blind_id_generate_private_key(ctx_self, 256)) + if(!d0_blind_id_generate_private_key(ctx_self, 1024)) errx(1, "keygen fail"); buf2size = sizeof(buf2) - 1; if(!d0_blind_id_fingerprint64_public_key(ctx_self, buf2, &buf2size)) -- 2.39.2