[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[GNUnet-SVN] r14129 - gnunet/src/dht
From: |
gnunet |
Subject: |
[GNUnet-SVN] r14129 - gnunet/src/dht |
Date: |
Mon, 10 Jan 2011 11:40:57 +0100 |
Author: nevans
Date: 2011-01-10 11:40:57 +0100 (Mon, 10 Jan 2011)
New Revision: 14129
Modified:
gnunet/src/dht/gnunet-dht-driver.c
Log:
allow to build without malicious code
Modified: gnunet/src/dht/gnunet-dht-driver.c
===================================================================
--- gnunet/src/dht/gnunet-dht-driver.c 2011-01-10 10:25:26 UTC (rev 14128)
+++ gnunet/src/dht/gnunet-dht-driver.c 2011-01-10 10:40:57 UTC (rev 14129)
@@ -2017,8 +2017,10 @@
GNUNET_free(find_peer_context);
fprintf(stderr, "Not sending any more find peer requests.\n");
+#if HAVE_MALICIOUS
if (GNUNET_YES == malicious_after_settle)
GNUNET_SCHEDULER_add_now(&setup_malicious_peers, NULL);
+#endif
}
}
}
@@ -2212,10 +2214,12 @@
if (dhtlog_handle != NULL)
dhtlog_handle->insert_round(DHT_ROUND_NORMAL, rounds_finished);
+#if HAVE_MALICIOUS
if (GNUNET_YES != malicious_after_settle)
{
GNUNET_SCHEDULER_add_now(&setup_malicious_peers, NULL);
}
+#endif
if (GNUNET_YES == do_find_peer)
{
@@ -2313,6 +2317,7 @@
&malicious_disconnect_task, ctx);
}
+#if HAVE_MALICIOUS
/**
* Choose the next peer from the peer group to set as malicious.
* If we are doing a sybil attack, find the nearest peer to the
@@ -2408,6 +2413,7 @@
GNUNET_SCHEDULER_add_now (&set_malicious, ctx);
}
}
+#endif
/**
* This function is called whenever a connection attempt is finished between
two of
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [GNUnet-SVN] r14129 - gnunet/src/dht,
gnunet <=