aboutsummaryrefslogtreecommitdiff
path: root/src/rps/gnunet-service-rps.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/rps/gnunet-service-rps.c')
-rw-r--r--src/rps/gnunet-service-rps.c11
1 files changed, 9 insertions, 2 deletions
diff --git a/src/rps/gnunet-service-rps.c b/src/rps/gnunet-service-rps.c
index 3148997aa..26778a14e 100644
--- a/src/rps/gnunet-service-rps.c
+++ b/src/rps/gnunet-service-rps.c
@@ -356,7 +356,7 @@ uint32_t pending_pull_reply_list_size;
356uint32_t num_hist_update_tasks; 356uint32_t num_hist_update_tasks;
357 357
358 358
359#if ENABLE_MALICIOUS 359#ifdef ENABLE_MALICIOUS
360/** 360/**
361 * Type of malicious peer 361 * Type of malicious peer
362 * 362 *
@@ -1332,7 +1332,9 @@ handle_peer_pull_reply (void *cls,
1332} 1332}
1333 1333
1334 1334
1335#if ENABLE_MALICIOUS 1335
1336
1337#ifdef ENABLE_MALICIOUS
1336/** 1338/**
1337 * Turn RPS service to act malicious. 1339 * Turn RPS service to act malicious.
1338 * 1340 *
@@ -2013,6 +2015,11 @@ run (void *cls,
2013 GNUNET_log (GNUNET_ERROR_TYPE_INFO, 2015 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
2014 "STARTING SERVICE (rps) for peer [%s]\n", 2016 "STARTING SERVICE (rps) for peer [%s]\n",
2015 GNUNET_i2s (&own_identity)); 2017 GNUNET_i2s (&own_identity));
2018 #ifdef ENABLE_MALICIOUS
2019 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2020 "Malicious execution compiled in.\n");
2021 #endif /* ENABLE_MALICIOUS */
2022
2016 2023
2017 2024
2018 /* Get time interval from the configuration */ 2025 /* Get time interval from the configuration */