aboutsummaryrefslogtreecommitdiff
path: root/src/core/gnunet-service-core_kx.c
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2016-05-06 14:44:08 +0000
committerChristian Grothoff <christian@grothoff.org>2016-05-06 14:44:08 +0000
commite8cf81fdb3fdaef59b49da8f6e952a3225ab326e (patch)
tree4e5f75d44a9121b32895fdfc5a4177052a7d923d /src/core/gnunet-service-core_kx.c
parentae8cb91d9961899075a892a3110204bc139c2eb6 (diff)
downloadgnunet-e8cf81fdb3fdaef59b49da8f6e952a3225ab326e.tar.gz
gnunet-e8cf81fdb3fdaef59b49da8f6e952a3225ab326e.zip
fixing compiler warnings
Diffstat (limited to 'src/core/gnunet-service-core_kx.c')
-rw-r--r--src/core/gnunet-service-core_kx.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/src/core/gnunet-service-core_kx.c b/src/core/gnunet-service-core_kx.c
index 9bb5af100..6a1924e54 100644
--- a/src/core/gnunet-service-core_kx.c
+++ b/src/core/gnunet-service-core_kx.c
@@ -916,9 +916,9 @@ GSC_KX_handle_ephemeral_key (struct GSC_KeyExchangeInfo *kx,
916 GNUNET_log (GNUNET_ERROR_TYPE_WARNING, 916 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
917 _("Ephemeral key message from peer `%s' rejected as its validity range does not match our system time (%llu not in [%llu,%llu]).\n"), 917 _("Ephemeral key message from peer `%s' rejected as its validity range does not match our system time (%llu not in [%llu,%llu]).\n"),
918 GNUNET_i2s (&kx->peer), 918 GNUNET_i2s (&kx->peer),
919 now.abs_value_us, 919 (unsigned long long) now.abs_value_us,
920 start_t.abs_value_us, 920 (unsigned long long) start_t.abs_value_us,
921 end_t.abs_value_us); 921 (unsigned long long) end_t.abs_value_us);
922 return; 922 return;
923 } 923 }
924 kx->other_ephemeral_key = m->ephemeral_key; 924 kx->other_ephemeral_key = m->ephemeral_key;
@@ -1395,7 +1395,7 @@ GSC_KX_encrypt_and_transmit (struct GSC_KeyExchangeInfo *kx,
1395 used - ENCRYPTED_HEADER_SIZE)); 1395 used - ENCRYPTED_HEADER_SIZE));
1396 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, 1396 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1397 "Encrypted %u bytes for %s\n", 1397 "Encrypted %u bytes for %s\n",
1398 used - ENCRYPTED_HEADER_SIZE, 1398 (unsigned int) (used - ENCRYPTED_HEADER_SIZE),
1399 GNUNET_i2s (&kx->peer)); 1399 GNUNET_i2s (&kx->peer));
1400 derive_auth_key (&auth_key, 1400 derive_auth_key (&auth_key,
1401 &kx->encrypt_key, 1401 &kx->encrypt_key,
@@ -1517,7 +1517,7 @@ GSC_KX_handle_encrypted_message (struct GSC_KeyExchangeInfo *kx,
1517 return; 1517 return;
1518 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, 1518 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1519 "Decrypted %u bytes from %s\n", 1519 "Decrypted %u bytes from %s\n",
1520 size - ENCRYPTED_HEADER_SIZE, 1520 (unsigned int) (size - ENCRYPTED_HEADER_SIZE),
1521 GNUNET_i2s (&kx->peer)); 1521 GNUNET_i2s (&kx->peer));
1522 pt = (struct EncryptedMessage *) buf; 1522 pt = (struct EncryptedMessage *) buf;
1523 1523