aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorJulius Bünger <buenger@mytum.de>2015-03-26 12:12:09 +0000
committerJulius Bünger <buenger@mytum.de>2015-03-26 12:12:09 +0000
commit496e08d0b3e7719b4bf63eb9e0a3e0f8f19d6569 (patch)
tree510e357759f793bb810243be9ce23e76356d4919 /src
parent759216e0aac8de4949e34f056d4b304acc6877ed (diff)
downloadgnunet-496e08d0b3e7719b4bf63eb9e0a3e0f8f19d6569.tar.gz
gnunet-496e08d0b3e7719b4bf63eb9e0a3e0f8f19d6569.zip
-cleaning up
Diffstat (limited to 'src')
-rw-r--r--src/rps/gnunet-service-rps.c10
1 files changed, 7 insertions, 3 deletions
diff --git a/src/rps/gnunet-service-rps.c b/src/rps/gnunet-service-rps.c
index 45c6d8ec9..243d54f7d 100644
--- a/src/rps/gnunet-service-rps.c
+++ b/src/rps/gnunet-service-rps.c
@@ -44,8 +44,6 @@
44 44
45// (TODO api -- possibility of getting weak random peer immideately) 45// (TODO api -- possibility of getting weak random peer immideately)
46 46
47// TODO malicious peer
48
49// TODO connect to friends 47// TODO connect to friends
50 48
51// TODO store peers somewhere 49// TODO store peers somewhere
@@ -2149,6 +2147,7 @@ static void
2149shutdown_task (void *cls, 2147shutdown_task (void *cls,
2150 const struct GNUNET_SCHEDULER_TaskContext *tc) 2148 const struct GNUNET_SCHEDULER_TaskContext *tc)
2151{ 2149{
2150
2152 LOG (GNUNET_ERROR_TYPE_DEBUG, "RPS is going down\n"); 2151 LOG (GNUNET_ERROR_TYPE_DEBUG, "RPS is going down\n");
2153 2152
2154 if (NULL != do_round_task) 2153 if (NULL != do_round_task)
@@ -2178,12 +2177,17 @@ shutdown_task (void *cls,
2178 GNUNET_array_grow (push_list, push_list_size, 0); 2177 GNUNET_array_grow (push_list, push_list_size, 0);
2179 GNUNET_array_grow (pull_list, pull_list_size, 0); 2178 GNUNET_array_grow (pull_list, pull_list_size, 0);
2180 #ifdef ENABLE_MALICIOUS 2179 #ifdef ENABLE_MALICIOUS
2180 struct AttackedPeer *tmp_att_peer;
2181 GNUNET_array_grow (mal_peers, num_mal_peers, 0); 2181 GNUNET_array_grow (mal_peers, num_mal_peers, 0);
2182 if (NULL != mal_peer_set) 2182 if (NULL != mal_peer_set)
2183 GNUNET_CONTAINER_multipeermap_destroy (mal_peer_set); 2183 GNUNET_CONTAINER_multipeermap_destroy (mal_peer_set);
2184 if (NULL != att_peer_set) 2184 if (NULL != att_peer_set)
2185 GNUNET_CONTAINER_multipeermap_destroy (att_peer_set); 2185 GNUNET_CONTAINER_multipeermap_destroy (att_peer_set);
2186 // TODO empty attacked_peers DLL 2186 while (NULL != att_peers_head)
2187 {
2188 tmp_att_peer = att_peers_head;
2189 GNUNET_CONTAINER_DLL_remove (att_peers_head, att_peers_tail, tmp_att_peer);
2190 }
2187 #endif /* ENABLE_MALICIOUS */ 2191 #endif /* ENABLE_MALICIOUS */
2188} 2192}
2189 2193