aboutsummaryrefslogtreecommitdiff
path: root/src/transport/gnunet-communicator-tcp.c
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2022-06-26 15:12:34 +0200
committerChristian Grothoff <christian@grothoff.org>2022-06-26 15:12:34 +0200
commitb6cbb6f800ef9aeebcfb76a7ba721d4b95a2e2ca (patch)
treec493c4495db597a0382c32f67837cfac23b9ddcf /src/transport/gnunet-communicator-tcp.c
parent4644e3ae1def4f43a24bc76f5dacc3dd94807126 (diff)
downloadgnunet-b6cbb6f800ef9aeebcfb76a7ba721d4b95a2e2ca.tar.gz
gnunet-b6cbb6f800ef9aeebcfb76a7ba721d4b95a2e2ca.zip
-fix typos
Diffstat (limited to 'src/transport/gnunet-communicator-tcp.c')
-rw-r--r--src/transport/gnunet-communicator-tcp.c20
1 files changed, 12 insertions, 8 deletions
diff --git a/src/transport/gnunet-communicator-tcp.c b/src/transport/gnunet-communicator-tcp.c
index be75fa0e8..6d7a151ec 100644
--- a/src/transport/gnunet-communicator-tcp.c
+++ b/src/transport/gnunet-communicator-tcp.c
@@ -1340,10 +1340,11 @@ do_rekey (struct Queue *queue, const struct TCPRekey *rekey)
1340 GNUNET_TIME_absolute_ntoh (thp.monotonic_time))); 1340 GNUNET_TIME_absolute_ntoh (thp.monotonic_time)));
1341 GNUNET_assert (ntohl ((&thp)->purpose.size) == sizeof (*(&thp))); 1341 GNUNET_assert (ntohl ((&thp)->purpose.size) == sizeof (*(&thp)));
1342 if (GNUNET_OK != 1342 if (GNUNET_OK !=
1343 GNUNET_CRYPTO_eddsa_verify (GNUNET_SIGNATURE_PURPOSE_COMMUNICATOR_TCP_REKEY, 1343 GNUNET_CRYPTO_eddsa_verify (
1344 &thp, 1344 GNUNET_SIGNATURE_PURPOSE_COMMUNICATOR_TCP_REKEY,
1345 &rekey->sender_sig, 1345 &thp,
1346 &queue->target.public_key)) 1346 &rekey->sender_sig,
1347 &queue->target.public_key))
1347 { 1348 {
1348 GNUNET_break (0); 1349 GNUNET_break (0);
1349 queue_finish (queue); 1350 queue_finish (queue);
@@ -1447,7 +1448,8 @@ handshake_ack_monotime_cb (void *cls,
1447 * @param queue The queue context. 1448 * @param queue The queue context.
1448 */ 1449 */
1449static void 1450static void
1450send_challenge (struct GNUNET_CRYPTO_ChallengeNonceP challenge, struct Queue *queue) 1451send_challenge (struct GNUNET_CRYPTO_ChallengeNonceP challenge, struct
1452 Queue *queue)
1451{ 1453{
1452 struct TCPConfirmationAck tca; 1454 struct TCPConfirmationAck tca;
1453 struct TcpHandshakeAckSignature thas; 1455 struct TcpHandshakeAckSignature thas;
@@ -2450,7 +2452,7 @@ boot_queue (struct Queue *queue)
2450 * Generate and transmit our ephemeral key and the signature for 2452 * Generate and transmit our ephemeral key and the signature for
2451 * the initial KX with the other peer. Must be called first, before 2453 * the initial KX with the other peer. Must be called first, before
2452 * any other bytes are ever written to the output buffer. Note that 2454 * any other bytes are ever written to the output buffer. Note that
2453 * our cipher must already be initialized when calling thi function. 2455 * our cipher must already be initialized when calling this function.
2454 * Helper function for #start_initial_kx_out(). 2456 * Helper function for #start_initial_kx_out().
2455 * 2457 *
2456 * @param queue queue to do KX for 2458 * @param queue queue to do KX for
@@ -2472,7 +2474,8 @@ transmit_kx (struct Queue *queue,
2472 GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_NONCE, 2474 GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_NONCE,
2473 &tc.challenge, 2475 &tc.challenge,
2474 sizeof(tc.challenge)); 2476 sizeof(tc.challenge));
2475 ths.purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_COMMUNICATOR_TCP_HANDSHAKE); 2477 ths.purpose.purpose = htonl (
2478 GNUNET_SIGNATURE_PURPOSE_COMMUNICATOR_TCP_HANDSHAKE);
2476 ths.purpose.size = htonl (sizeof(ths)); 2479 ths.purpose.size = htonl (sizeof(ths));
2477 ths.sender = my_identity; 2480 ths.sender = my_identity;
2478 ths.receiver = queue->target; 2481 ths.receiver = queue->target;
@@ -2625,7 +2628,8 @@ decrypt_and_check_tc (struct Queue *queue,
2625 sizeof(*tc), 2628 sizeof(*tc),
2626 &ibuf[sizeof(struct GNUNET_CRYPTO_EcdhePublicKey)], 2629 &ibuf[sizeof(struct GNUNET_CRYPTO_EcdhePublicKey)],
2627 sizeof(*tc))); 2630 sizeof(*tc)));
2628 ths.purpose.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_COMMUNICATOR_TCP_HANDSHAKE); 2631 ths.purpose.purpose = htonl (
2632 GNUNET_SIGNATURE_PURPOSE_COMMUNICATOR_TCP_HANDSHAKE);
2629 ths.purpose.size = htonl (sizeof(ths)); 2633 ths.purpose.size = htonl (sizeof(ths));
2630 ths.sender = tc->sender; 2634 ths.sender = tc->sender;
2631 ths.receiver = my_identity; 2635 ths.receiver = my_identity;