diff options
author | Christian Grothoff <christian@grothoff.org> | 2012-05-08 19:17:03 +0000 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2012-05-08 19:17:03 +0000 |
commit | 6623d76dcb3659204935e462a8d0d415c7748a99 (patch) | |
tree | 9d89e4f33b7c60bbd08d2ed85a7d439b963044e6 /src/core | |
parent | 31adadd3c4ca45d147392d6fa5ee839be1037740 (diff) | |
download | gnunet-6623d76dcb3659204935e462a8d0d415c7748a99.tar.gz gnunet-6623d76dcb3659204935e462a8d0d415c7748a99.zip |
-allow helper send to be cancelled
Diffstat (limited to 'src/core')
-rw-r--r-- | src/core/gnunet-service-core_kx.c | 15 |
1 files changed, 14 insertions, 1 deletions
diff --git a/src/core/gnunet-service-core_kx.c b/src/core/gnunet-service-core_kx.c index 3f415ebc9..f162184eb 100644 --- a/src/core/gnunet-service-core_kx.c +++ b/src/core/gnunet-service-core_kx.c | |||
@@ -41,7 +41,7 @@ | |||
41 | /** | 41 | /** |
42 | * Set to GNUNET_YES to perform some slightly expensive internal invariant checks. | 42 | * Set to GNUNET_YES to perform some slightly expensive internal invariant checks. |
43 | */ | 43 | */ |
44 | #define EXTRA_CHECKS GNUNET_NO | 44 | #define EXTRA_CHECKS GNUNET_YES |
45 | 45 | ||
46 | /** | 46 | /** |
47 | * How long do we wait for SET_KEY confirmation initially? | 47 | * How long do we wait for SET_KEY confirmation initially? |
@@ -877,6 +877,12 @@ GSC_KX_handle_set_key (struct GSC_KeyExchangeInfo *kx, | |||
877 | (GNUNET_OK != GNUNET_CRYPTO_aes_check_session_key (&k))) | 877 | (GNUNET_OK != GNUNET_CRYPTO_aes_check_session_key (&k))) |
878 | { | 878 | { |
879 | /* failed to decrypt !? */ | 879 | /* failed to decrypt !? */ |
880 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
881 | "Invalid key %x decrypted by %s from message %u (origin: %s)\n", | ||
882 | (unsigned int) GNUNET_CRYPTO_crc32_n (&k, sizeof (struct GNUNET_CRYPTO_AesSessionKey)), | ||
883 | GNUNET_i2s (&GSC_my_identity), | ||
884 | (unsigned int) GNUNET_CRYPTO_crc32_n (&m->encrypted_key, sizeof (struct GNUNET_CRYPTO_RsaEncryptedData)), | ||
885 | GNUNET_h2s (&kx->peer.hashPubKey)); | ||
880 | GNUNET_break_op (0); | 886 | GNUNET_break_op (0); |
881 | return; | 887 | return; |
882 | } | 888 | } |
@@ -1058,6 +1064,13 @@ setup_fresh_setkey (struct GSC_KeyExchangeInfo *kx) | |||
1058 | GNUNET_CRYPTO_AesSessionKey), | 1064 | GNUNET_CRYPTO_AesSessionKey), |
1059 | kx->public_key, | 1065 | kx->public_key, |
1060 | &skm->encrypted_key)); | 1066 | &skm->encrypted_key)); |
1067 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | ||
1068 | "Encrypting key %x for %s resulting in message %u (origin: %s)\n", | ||
1069 | (unsigned int) GNUNET_CRYPTO_crc32_n (&kx->encrypt_key, sizeof (struct GNUNET_CRYPTO_AesSessionKey)), | ||
1070 | GNUNET_i2s (&kx->peer), | ||
1071 | (unsigned int) GNUNET_CRYPTO_crc32_n (&skm->encrypted_key, sizeof (struct GNUNET_CRYPTO_RsaEncryptedData)), | ||
1072 | GNUNET_h2s (&GSC_my_identity.hashPubKey)); | ||
1073 | |||
1061 | GNUNET_assert (GNUNET_OK == | 1074 | GNUNET_assert (GNUNET_OK == |
1062 | GNUNET_CRYPTO_rsa_sign (my_private_key, &skm->purpose, | 1075 | GNUNET_CRYPTO_rsa_sign (my_private_key, &skm->purpose, |
1063 | &skm->signature)); | 1076 | &skm->signature)); |