From adf2a547f8bd6c8ecc413a52ce393aafc7627d28 Mon Sep 17 00:00:00 2001 From: "Nathan S. Evans" Date: Sun, 17 Jul 2011 21:39:48 +0000 Subject: remove crap --- src/nse/nse.h | 22 ---------------------- 1 file changed, 22 deletions(-) (limited to 'src/nse/nse.h') diff --git a/src/nse/nse.h b/src/nse/nse.h index 245bd4ca7..f0a914488 100644 --- a/src/nse/nse.h +++ b/src/nse/nse.h @@ -66,28 +66,6 @@ struct GNUNET_NSE_ClientMessage * Network size estimate reply; sent when "this" * peer's timer has run out before receiving a * valid reply from another peer. - * - * FIXME: Is this the right way to do this? - * I think we need to include both the public - * key and the timestamp signed by the private - * key. This way a recipient - * can verify that the peer at least generated - * the public/private key pair, and that the - * timestamp matches what the current peer - * believes it should be. The receiving peer - * would then check whether the XOR of the peer - * identity and the timestamp is within a - * reasonable range of the current time - * (+/- N seconds). If a closer message which - * also verifies hasn't been received (or this - * message is a duplicate), the peer - * calculates the size estimate and forwards - * the request to all other peers. - * - * Hmm... Is it enought to *just* send the peer - * identity? Obviously this is smaller, but it - * doesn't allow us to verify that the - * public/private key pair were generated, right? */ struct GNUNET_NSE_FloodMessage { -- cgit v1.2.3