aboutsummaryrefslogtreecommitdiff
path: root/src/cadet/gnunet-service-cadet_tunnels.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/cadet/gnunet-service-cadet_tunnels.c')
-rw-r--r--src/cadet/gnunet-service-cadet_tunnels.c8
1 files changed, 3 insertions, 5 deletions
diff --git a/src/cadet/gnunet-service-cadet_tunnels.c b/src/cadet/gnunet-service-cadet_tunnels.c
index 6f2dd1d8d..d7c7f278e 100644
--- a/src/cadet/gnunet-service-cadet_tunnels.c
+++ b/src/cadet/gnunet-service-cadet_tunnels.c
@@ -1922,6 +1922,7 @@ test_crypto_bug (const struct GNUNET_CRYPTO_EcdhePrivateKey *e1,
1922 check_ed (e2, d1); 1922 check_ed (e2, d1);
1923} 1923}
1924 1924
1925
1925#endif 1926#endif
1926 1927
1927 1928
@@ -2064,7 +2065,6 @@ GCT_handle_kx_auth (struct CadetTConnection *ct,
2064} 2065}
2065 2066
2066 2067
2067
2068/* ************************************** end core crypto ***************************** */ 2068/* ************************************** end core crypto ***************************** */
2069 2069
2070 2070
@@ -2828,8 +2828,7 @@ maintain_connections_cb (void *cls)
2828 restarted after that happens). 2828 restarted after that happens).
2829 Furthermore, if the paths we do know are in a reasonably narrow 2829 Furthermore, if the paths we do know are in a reasonably narrow
2830 quality band and are plentyful, we might also consider us stabilized 2830 quality band and are plentyful, we might also consider us stabilized
2831 and then reduce the frequency accordingly. */ 2831 and then reduce the frequency accordingly. */delay = GNUNET_TIME_UNIT_MINUTES;
2832 delay = GNUNET_TIME_UNIT_MINUTES;
2833 t->maintain_connections_task 2832 t->maintain_connections_task
2834 = GNUNET_SCHEDULER_add_delayed (delay, 2833 = GNUNET_SCHEDULER_add_delayed (delay,
2835 &maintain_connections_cb, 2834 &maintain_connections_cb,
@@ -3398,8 +3397,7 @@ GCT_handle_encrypted (struct CadetTConnection *ct,
3398 this increment if we successfully decrypted with the old KX 3397 this increment if we successfully decrypted with the old KX
3399 material and thus didn't even both with the new one. This is 3398 material and thus didn't even both with the new one. This is
3400 the ideal case, as a malicious injection of bogus KX data 3399 the ideal case, as a malicious injection of bogus KX data
3401 basically only causes us to increment a counter a few times. */ 3400 basically only causes us to increment a counter a few times. */t->unverified_attempts++;
3402 t->unverified_attempts++;
3403 LOG (GNUNET_ERROR_TYPE_DEBUG, 3401 LOG (GNUNET_ERROR_TYPE_DEBUG,
3404 "Failed to decrypt message with unverified KX data %u times\n", 3402 "Failed to decrypt message with unverified KX data %u times\n",
3405 t->unverified_attempts); 3403 t->unverified_attempts);