From 1cbbfc27655ae1147f9d32c8054e1c904e881ca1 Mon Sep 17 00:00:00 2001 From: Juri Dispan Date: Mon, 20 Feb 2023 09:25:42 +0000 Subject: [PATCH 1/4] fix log message for applying fixedpoint after bignum --- lib/ext/jiff-client-bignumber.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/ext/jiff-client-bignumber.js b/lib/ext/jiff-client-bignumber.js index de0a90a24..ae90f32ec 100644 --- a/lib/ext/jiff-client-bignumber.js +++ b/lib/ext/jiff-client-bignumber.js @@ -271,7 +271,7 @@ throw new Error('Please apply bignumber before negative number extensions'); } if (jiff.has_extension('fixedpoint')) { - throw new Error('Please apply bignumber before negative number extensions'); + throw new Error('Please apply bignumber before fixedpoint extensions'); } // Turn things into their BigNumber equivalent From 5651f2940356be39041b12c4ab6f7781abfb9eb1 Mon Sep 17 00:00:00 2001 From: Juri Dispan Date: Fri, 24 Feb 2023 09:51:33 +0000 Subject: [PATCH 2/4] fix typo in helpers.js --- lib/common/helpers.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/common/helpers.js b/lib/common/helpers.js index 5fbab5a01..85e114ea9 100644 --- a/lib/common/helpers.js +++ b/lib/common/helpers.js @@ -43,7 +43,7 @@ exports.random = function (max) { } }; -// actual mode +// actual mod exports.mod = function (x, y) { if (x < 0) { return (x % y) + y; From e223110990587ede6e63d200a5c48eb0b0611e15 Mon Sep 17 00:00:00 2001 From: Juri Dispan Date: Mon, 27 Feb 2023 10:34:54 +0000 Subject: [PATCH 3/4] fix typo in readme --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 74b5513cb..46ea75b5c 100644 --- a/README.md +++ b/README.md @@ -177,7 +177,7 @@ performing the preprocessing may be different than the ones carrying out the onl If preprocessing is not used, and `crypto_provider` option is set to true during instance creation, JIFF will acquire all required corelated randomness and preprocessing material from the server. This yields an asymetric trust model, where the computation is secure -against a dishonest majority of non-server parties, but insecure against coalitions of one or more party plus the server. Conretely, this +against a dishonest majority of non-server parties, but insecure against coalitions of one or more party plus the server. Concretely, this reduces to more traditional models in certain cases. For example, if the computation is made out of two parties and a server, this becomes equivalent to 3-party computation with honest majority. From 4206309e1bd06a40ceb5f78b4be4639644a06102 Mon Sep 17 00:00:00 2001 From: Juri Dispan Date: Tue, 28 Feb 2023 12:20:56 +0000 Subject: [PATCH 4/4] fix typo in error message --- lib/ext/jiff-client-websockets.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/ext/jiff-client-websockets.js b/lib/ext/jiff-client-websockets.js index a6f9cd63e..40292781d 100644 --- a/lib/ext/jiff-client-websockets.js +++ b/lib/ext/jiff-client-websockets.js @@ -188,7 +188,7 @@ onError(msg.data); break; default: - console.log('Uknown protocol, ' + msg.socketProtocol + ', received'); + console.log('Unknown protocol, ' + msg.socketProtocol + ', received'); } }