aboutsummaryrefslogtreecommitdiff
path: root/src/core
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2012-05-08 19:17:03 +0000
committerChristian Grothoff <christian@grothoff.org>2012-05-08 19:17:03 +0000
commit6623d76dcb3659204935e462a8d0d415c7748a99 (patch)
tree9d89e4f33b7c60bbd08d2ed85a7d439b963044e6 /src/core
parent31adadd3c4ca45d147392d6fa5ee839be1037740 (diff)
downloadgnunet-6623d76dcb3659204935e462a8d0d415c7748a99.tar.gz
gnunet-6623d76dcb3659204935e462a8d0d415c7748a99.zip
-allow helper send to be cancelled
Diffstat (limited to 'src/core')
-rw-r--r--src/core/gnunet-service-core_kx.c15
1 files changed, 14 insertions, 1 deletions
diff --git a/src/core/gnunet-service-core_kx.c b/src/core/gnunet-service-core_kx.c
index 3f415ebc9..f162184eb 100644
--- a/src/core/gnunet-service-core_kx.c
+++ b/src/core/gnunet-service-core_kx.c
@@ -41,7 +41,7 @@
41/** 41/**
42 * Set to GNUNET_YES to perform some slightly expensive internal invariant checks. 42 * Set to GNUNET_YES to perform some slightly expensive internal invariant checks.
43 */ 43 */
44#define EXTRA_CHECKS GNUNET_NO 44#define EXTRA_CHECKS GNUNET_YES
45 45
46/** 46/**
47 * How long do we wait for SET_KEY confirmation initially? 47 * How long do we wait for SET_KEY confirmation initially?
@@ -877,6 +877,12 @@ GSC_KX_handle_set_key (struct GSC_KeyExchangeInfo *kx,
877 (GNUNET_OK != GNUNET_CRYPTO_aes_check_session_key (&k))) 877 (GNUNET_OK != GNUNET_CRYPTO_aes_check_session_key (&k)))
878 { 878 {
879 /* failed to decrypt !? */ 879 /* failed to decrypt !? */
880 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
881 "Invalid key %x decrypted by %s from message %u (origin: %s)\n",
882 (unsigned int) GNUNET_CRYPTO_crc32_n (&k, sizeof (struct GNUNET_CRYPTO_AesSessionKey)),
883 GNUNET_i2s (&GSC_my_identity),
884 (unsigned int) GNUNET_CRYPTO_crc32_n (&m->encrypted_key, sizeof (struct GNUNET_CRYPTO_RsaEncryptedData)),
885 GNUNET_h2s (&kx->peer.hashPubKey));
880 GNUNET_break_op (0); 886 GNUNET_break_op (0);
881 return; 887 return;
882 } 888 }
@@ -1058,6 +1064,13 @@ setup_fresh_setkey (struct GSC_KeyExchangeInfo *kx)
1058 GNUNET_CRYPTO_AesSessionKey), 1064 GNUNET_CRYPTO_AesSessionKey),
1059 kx->public_key, 1065 kx->public_key,
1060 &skm->encrypted_key)); 1066 &skm->encrypted_key));
1067 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
1068 "Encrypting key %x for %s resulting in message %u (origin: %s)\n",
1069 (unsigned int) GNUNET_CRYPTO_crc32_n (&kx->encrypt_key, sizeof (struct GNUNET_CRYPTO_AesSessionKey)),
1070 GNUNET_i2s (&kx->peer),
1071 (unsigned int) GNUNET_CRYPTO_crc32_n (&skm->encrypted_key, sizeof (struct GNUNET_CRYPTO_RsaEncryptedData)),
1072 GNUNET_h2s (&GSC_my_identity.hashPubKey));
1073
1061 GNUNET_assert (GNUNET_OK == 1074 GNUNET_assert (GNUNET_OK ==
1062 GNUNET_CRYPTO_rsa_sign (my_private_key, &skm->purpose, 1075 GNUNET_CRYPTO_rsa_sign (my_private_key, &skm->purpose,
1063 &skm->signature)); 1076 &skm->signature));