diff options
author | Julius Bünger <buenger@mytum.de> | 2020-11-16 22:53:30 +0100 |
---|---|---|
committer | Julius Bünger <buenger@mytum.de> | 2020-11-16 22:53:30 +0100 |
commit | 0108f132a418aa48222e2798dba4de38de8dfef5 (patch) | |
tree | b5b024fe34f6b45ad2b59b8cb4f1a83a3db5638a | |
parent | d9b47275349c8686f3e75c4c04c0e717894f1cb8 (diff) | |
download | gnunet-0108f132a418aa48222e2798dba4de38de8dfef5.tar.gz gnunet-0108f132a418aa48222e2798dba4de38de8dfef5.zip |
rps: get rid of warnings about harmless uninitialized variables
-rw-r--r-- | src/rps/gnunet-service-rps.c | 2 | ||||
-rw-r--r-- | src/rps/rps-sampler_client.c | 3 |
2 files changed, 4 insertions, 1 deletions
diff --git a/src/rps/gnunet-service-rps.c b/src/rps/gnunet-service-rps.c index ecbc8e208..0e3759c4c 100644 --- a/src/rps/gnunet-service-rps.c +++ b/src/rps/gnunet-service-rps.c | |||
@@ -596,8 +596,10 @@ static const uint32_t num_valid_peers_max = UINT32_MAX; | |||
596 | static void | 596 | static void |
597 | do_round (void *cls); | 597 | do_round (void *cls); |
598 | 598 | ||
599 | #if ENABLE_MALICIOUS | ||
599 | static void | 600 | static void |
600 | do_mal_round (void *cls); | 601 | do_mal_round (void *cls); |
602 | #endif /* ENABLE_MALICIOUS */ | ||
601 | 603 | ||
602 | 604 | ||
603 | /** | 605 | /** |
diff --git a/src/rps/rps-sampler_client.c b/src/rps/rps-sampler_client.c index 5ab854e01..714943b51 100644 --- a/src/rps/rps-sampler_client.c +++ b/src/rps/rps-sampler_client.c | |||
@@ -379,7 +379,8 @@ sampler_mod_get_rand_peer (void *cls) | |||
379 | return; | 379 | return; |
380 | } | 380 | } |
381 | /* compute probability */ | 381 | /* compute probability */ |
382 | /* Currently disabled due to numerical limitations */ | 382 | /* FIXME: Currently disabled due to numerical limitations */ |
383 | prob_observed_n = 0; // Inititialise to some value | ||
383 | // prob_observed_n = prob_observed_n_peers (sampler->num_peers_estim, | 384 | // prob_observed_n = prob_observed_n_peers (sampler->num_peers_estim, |
384 | // s_elem->num_peers, | 385 | // s_elem->num_peers, |
385 | // sampler->deficiency_factor); | 386 | // sampler->deficiency_factor); |