diff options
author | Julius Bünger <buenger@mytum.de> | 2015-03-26 12:12:09 +0000 |
---|---|---|
committer | Julius Bünger <buenger@mytum.de> | 2015-03-26 12:12:09 +0000 |
commit | 496e08d0b3e7719b4bf63eb9e0a3e0f8f19d6569 (patch) | |
tree | 510e357759f793bb810243be9ce23e76356d4919 /src | |
parent | 759216e0aac8de4949e34f056d4b304acc6877ed (diff) | |
download | gnunet-496e08d0b3e7719b4bf63eb9e0a3e0f8f19d6569.tar.gz gnunet-496e08d0b3e7719b4bf63eb9e0a3e0f8f19d6569.zip |
-cleaning up
Diffstat (limited to 'src')
-rw-r--r-- | src/rps/gnunet-service-rps.c | 10 |
1 files changed, 7 insertions, 3 deletions
diff --git a/src/rps/gnunet-service-rps.c b/src/rps/gnunet-service-rps.c index 45c6d8ec9..243d54f7d 100644 --- a/src/rps/gnunet-service-rps.c +++ b/src/rps/gnunet-service-rps.c | |||
@@ -44,8 +44,6 @@ | |||
44 | 44 | ||
45 | // (TODO api -- possibility of getting weak random peer immideately) | 45 | // (TODO api -- possibility of getting weak random peer immideately) |
46 | 46 | ||
47 | // TODO malicious peer | ||
48 | |||
49 | // TODO connect to friends | 47 | // TODO connect to friends |
50 | 48 | ||
51 | // TODO store peers somewhere | 49 | // TODO store peers somewhere |
@@ -2149,6 +2147,7 @@ static void | |||
2149 | shutdown_task (void *cls, | 2147 | shutdown_task (void *cls, |
2150 | const struct GNUNET_SCHEDULER_TaskContext *tc) | 2148 | const struct GNUNET_SCHEDULER_TaskContext *tc) |
2151 | { | 2149 | { |
2150 | |||
2152 | LOG (GNUNET_ERROR_TYPE_DEBUG, "RPS is going down\n"); | 2151 | LOG (GNUNET_ERROR_TYPE_DEBUG, "RPS is going down\n"); |
2153 | 2152 | ||
2154 | if (NULL != do_round_task) | 2153 | if (NULL != do_round_task) |
@@ -2178,12 +2177,17 @@ shutdown_task (void *cls, | |||
2178 | GNUNET_array_grow (push_list, push_list_size, 0); | 2177 | GNUNET_array_grow (push_list, push_list_size, 0); |
2179 | GNUNET_array_grow (pull_list, pull_list_size, 0); | 2178 | GNUNET_array_grow (pull_list, pull_list_size, 0); |
2180 | #ifdef ENABLE_MALICIOUS | 2179 | #ifdef ENABLE_MALICIOUS |
2180 | struct AttackedPeer *tmp_att_peer; | ||
2181 | GNUNET_array_grow (mal_peers, num_mal_peers, 0); | 2181 | GNUNET_array_grow (mal_peers, num_mal_peers, 0); |
2182 | if (NULL != mal_peer_set) | 2182 | if (NULL != mal_peer_set) |
2183 | GNUNET_CONTAINER_multipeermap_destroy (mal_peer_set); | 2183 | GNUNET_CONTAINER_multipeermap_destroy (mal_peer_set); |
2184 | if (NULL != att_peer_set) | 2184 | if (NULL != att_peer_set) |
2185 | GNUNET_CONTAINER_multipeermap_destroy (att_peer_set); | 2185 | GNUNET_CONTAINER_multipeermap_destroy (att_peer_set); |
2186 | // TODO empty attacked_peers DLL | 2186 | while (NULL != att_peers_head) |
2187 | { | ||
2188 | tmp_att_peer = att_peers_head; | ||
2189 | GNUNET_CONTAINER_DLL_remove (att_peers_head, att_peers_tail, tmp_att_peer); | ||
2190 | } | ||
2187 | #endif /* ENABLE_MALICIOUS */ | 2191 | #endif /* ENABLE_MALICIOUS */ |
2188 | } | 2192 | } |
2189 | 2193 | ||