[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[GNUnet-SVN] r8504 - gnunet/src/core
From: |
gnunet |
Subject: |
[GNUnet-SVN] r8504 - gnunet/src/core |
Date: |
Tue, 9 Jun 2009 18:10:05 -0600 |
Author: grothoff
Date: 2009-06-09 18:10:05 -0600 (Tue, 09 Jun 2009)
New Revision: 8504
Modified:
gnunet/src/core/core.h
gnunet/src/core/core_api.c
gnunet/src/core/gnunet-service-core.c
gnunet/src/core/test_core_api.c
gnunet/src/core/test_core_api_peer1.conf
gnunet/src/core/test_core_api_peer2.conf
Log:
fixes
Modified: gnunet/src/core/core.h
===================================================================
--- gnunet/src/core/core.h 2009-06-10 00:07:42 UTC (rev 8503)
+++ gnunet/src/core/core.h 2009-06-10 00:10:05 UTC (rev 8504)
@@ -29,7 +29,7 @@
/**
* General core debugging.
*/
-#define DEBUG_CORE GNUNET_YES
+#define DEBUG_CORE GNUNET_NO
/**
* Debugging interaction core-clients.
Modified: gnunet/src/core/core_api.c
===================================================================
--- gnunet/src/core/core_api.c 2009-06-10 00:07:42 UTC (rev 8503)
+++ gnunet/src/core/core_api.c 2009-06-10 00:10:05 UTC (rev 8504)
@@ -427,9 +427,11 @@
return;
}
msize = ntohs (msg->size);
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Processing message of type %u and size %u from core service\n",
ntohs (msg->type), msize);
+#endif
switch (ntohs (msg->type))
{
case GNUNET_MESSAGE_TYPE_CORE_NOTIFY_CONNECT:
@@ -468,9 +470,11 @@
}
ntm = (const struct NotifyTrafficMessage *) msg;
em = (const struct GNUNET_MessageHeader *) &ntm[1];
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Received message of type %u from peer `%4s'\n",
ntohs (em->type), GNUNET_i2s (&ntm->peer));
+#endif
if ((GNUNET_NO == h->inbound_hdr_only) &&
(msize != ntohs (em->size) + sizeof (struct NotifyTrafficMessage)))
{
@@ -620,9 +624,11 @@
}
m = (const struct InitReplyMessage *) msg;
/* start our message processing loop */
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
_
("Successfully connected to core service, starting processing
loop.\n"));
+#endif
h->currently_down = GNUNET_NO;
trigger_next_request (h);
GNUNET_CLIENT_receive (h->client,
@@ -631,8 +637,10 @@
{
/* mark so we don't call init on reconnect */
h->init = NULL;
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
_("Successfully connected to core service.\n"));
+#endif
GNUNET_CRYPTO_hash (&m->publicKey,
sizeof (struct
GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
@@ -800,9 +808,11 @@
GNUNET_assert (h->hcnt <
(GNUNET_SERVER_MAX_MESSAGE_SIZE -
sizeof (struct InitMessage)) / sizeof (uint16_t));
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Trying to connect to core service in next %llu ms.\n",
timeout.value);
+#endif
h->th =
GNUNET_CLIENT_notify_transmit_ready (h->client,
sizeof (struct InitMessage) +
Modified: gnunet/src/core/gnunet-service-core.c
===================================================================
--- gnunet/src/core/gnunet-service-core.c 2009-06-10 00:07:42 UTC (rev
8503)
+++ gnunet/src/core/gnunet-service-core.c 2009-06-10 00:10:05 UTC (rev
8504)
@@ -1065,10 +1065,12 @@
memcpy (cbuf, &m[1], m->size);
ret = m->size;
process_encrypted_neighbour_queue (n);
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Copied message of type %u and size %u into transport buffer
for `%4s'\n",
ntohs (((struct GNUNET_MessageHeader *) &m[1])->type),
ret, GNUNET_i2s (&n->peer));
+#endif
}
else
{
@@ -1110,6 +1112,7 @@
process_plaintext_neighbour_queue (n);
return;
}
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Asking transport for transmission of %u bytes to `%4s' in next
%llu ms\n",
n->encrypted_head->size,
@@ -1117,6 +1120,7 @@
GNUNET_TIME_absolute_get_remaining (n->
encrypted_head->deadline).
value);
+#endif
n->th =
GNUNET_TRANSPORT_notify_transmit_ready (transport, &n->peer,
n->encrypted_head->size,
@@ -1172,9 +1176,11 @@
GNUNET_break (0);
return GNUNET_SYSERR;
}
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Decrypted %u bytes from `%4s' using key %u\n",
size, GNUNET_i2s (&n->peer), n->decrypt_key.crc32);
+#endif
return GNUNET_OK;
}
@@ -1207,9 +1213,11 @@
(const struct
GNUNET_CRYPTO_AesInitializationVector
*) iv, out));
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Encrypted %u bytes for `%4s' using key %u\n", size,
GNUNET_i2s (&n->peer), n->encrypt_key.crc32);
+#endif
return GNUNET_OK;
}
@@ -1357,9 +1365,11 @@
pos->do_transmit = GNUNET_NO; /* mark for not transmitting! */
pos = pos->next;
}
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Selected %u bytes of plaintext messages for transmission to
`%4s'.\n",
off, GNUNET_i2s (&n->peer));
+#endif
return off;
}
@@ -1395,7 +1405,7 @@
*retry_time = GNUNET_TIME_UNIT_FOREVER_REL;
if (0 == select_messages (n, size, retry_time))
{
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
+ GNUNET_log (GNUNET_ERROR_TYPE_INFO,
"No messages selected, will try again in %llu ms\n",
retry_time->value);
return 0;
@@ -1496,23 +1506,29 @@
{
case PEER_STATE_DOWN:
send_key (n);
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Not yet connected to `%4s', deferring processing of
plaintext messages.\n",
GNUNET_i2s(&n->peer));
+#endif
return;
case PEER_STATE_KEY_SENT:
GNUNET_assert (n->retry_set_key_task !=
GNUNET_SCHEDULER_NO_PREREQUISITE_TASK);
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Not yet connected to `%4s', deferring processing of
plaintext messages.\n",
GNUNET_i2s(&n->peer));
+#endif
return;
case PEER_STATE_KEY_RECEIVED:
GNUNET_assert (n->retry_set_key_task !=
GNUNET_SCHEDULER_NO_PREREQUISITE_TASK);
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Not yet connected to `%4s', deferring processing of
plaintext messages.\n",
GNUNET_i2s(&n->peer));
+#endif
return;
case PEER_STATE_KEY_CONFIRMED:
/* ready to continue */
@@ -1520,17 +1536,21 @@
}
if (n->messages == NULL)
{
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Plaintext message queue for `%4s' is empty.\n",
GNUNET_i2s(&n->peer));
+#endif
return; /* no pending messages */
}
discard_expired_messages (n);
if (n->encrypted_head != NULL)
{
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Encrypted message queue for `%4s' is still full, delaying
plaintext processing.\n",
GNUNET_i2s(&n->peer));
+#endif
return; /* wait for messages already encrypted to be
processed first! */
}
@@ -1545,9 +1565,11 @@
&deadline, &retry_time, &priority);
if (used == sizeof (struct EncryptedMessage))
{
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"No messages selected for transmission to `%4s' at this
time, will try again later.\n",
GNUNET_i2s(&n->peer));
+#endif
/* no messages selected for sending, try again later... */
n->retry_plaintext_task =
GNUNET_SCHEDULER_add_delayed (sched,
@@ -1575,10 +1597,12 @@
esize = used - ENCRYPTED_HEADER_SIZE;
GNUNET_CRYPTO_hash (&ph->sequence_number, esize, &em->plaintext_hash);
/* encrypt */
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Encrypting %u bytes of plaintext messages for `%4s' for
transmission.\n",
esize,
GNUNET_i2s(&n->peer));
+#endif
GNUNET_assert (GNUNET_OK ==
do_encrypt (n,
&em->plaintext_hash,
@@ -1621,17 +1645,21 @@
if (buf == NULL)
{
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
"Asked to send message to disconnected peer `%4s' and
connection failed. Discarding message.\n",
GNUNET_i2s (&sm->peer));
+#endif
GNUNET_free (sm);
/* FIXME: do we need to do something here to let the
client know about the failure!? */
return 0;
}
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Connection to peer `%4s' succeeded, retrying original
transmission request\n",
GNUNET_i2s (&sm->peer));
+#endif
handle_client_send (NULL, NULL, &sm->header);
GNUNET_free (sm);
return 0;
@@ -1677,11 +1705,13 @@
n = find_neighbour (&sm->peer);
if (n == NULL)
{
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Core received `%s' request for `%4s', will try to establish
connection within %llu ms\n",
"SEND",
GNUNET_i2s (&sm->peer),
sm->deadline.value);
+#endif
msize += sizeof (struct SendMessage);
/* ask transport to connect to the peer */
/* FIXME: this code does not handle the
@@ -1702,11 +1732,13 @@
GNUNET_SERVER_receive_done (client, GNUNET_OK);
return;
}
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Core received `%s' request, queueing %u bytes of plaintext data
for transmission to `%4s'.\n",
"SEND",
msize,
GNUNET_i2s (&sm->peer));
+#endif
/* FIXME: consider bounding queue size */
e = GNUNET_malloc (sizeof (struct MessageEntry) + msize);
e->deadline = GNUNET_TIME_absolute_ntoh (sm->deadline);
@@ -1777,10 +1809,12 @@
return;
if (n->public_key != NULL)
return;
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Received new `%s' message for `%4s', initiating key
exchange.\n",
"HELLO",
GNUNET_i2s (peer));
+#endif
n->public_key =
GNUNET_malloc (sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded));
if (GNUNET_OK != GNUNET_HELLO_get_key (hello, n->public_key))
@@ -1823,15 +1857,19 @@
struct PingMessage pp;
struct PingMessage *pm;
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Asked to perform key exchange with `%4s'.\n",
GNUNET_i2s (&n->peer));
+#endif
if (n->public_key == NULL)
{
/* lookup n's public key, then try again */
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Lacking public key for `%4s', trying to obtain one.\n",
GNUNET_i2s (&n->peer));
+#endif
GNUNET_PEERINFO_for_all (cfg,
sched,
&n->peer,
@@ -1887,6 +1925,7 @@
pm->header.type = htons (GNUNET_MESSAGE_TYPE_CORE_PING);
pp.challenge = htonl (n->ping_challenge);
pp.target = n->peer;
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Encrypting `%s' and `%s' messages for `%4s'.\n",
"SET_KEY", "PING", GNUNET_i2s (&n->peer));
@@ -1894,6 +1933,7 @@
"Sending `%s' to `%4s' with challenge %u encrypted using key
%u\n",
"PING",
GNUNET_i2s (&n->peer), n->ping_challenge, n->encrypt_key.crc32);
+#endif
do_encrypt (n,
&n->peer.hashPubKey,
&pp.challenge,
@@ -1982,9 +2022,11 @@
n->public_key = NULL;
return;
}
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Received `%s' for `%4s', continuing processing of `%s'
message.\n",
"HELLO", GNUNET_i2s (peer), "SET_KEY");
+#endif
handle_set_key (n, sm);
}
@@ -2003,9 +2045,11 @@
struct PingMessage *tp;
struct MessageEntry *me;
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Core service receives `%s' request from `%4s'.\n",
"PING", GNUNET_i2s (&n->peer));
+#endif
if (GNUNET_OK !=
do_decrypt (n,
&my_identity.hashPubKey,
@@ -2014,6 +2058,7 @@
sizeof (struct PingMessage) -
sizeof (struct GNUNET_MessageHeader)))
return;
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Decrypted `%s' to `%4s' with challenge %u decrypted using key
%u\n",
"PING",
@@ -2022,6 +2067,7 @@
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Target of `%s' request is `%4s'.\n",
"PING", GNUNET_i2s (&t.target));
+#endif
if (0 != memcmp (&t.target,
&my_identity, sizeof (struct GNUNET_PeerIdentity)))
{
@@ -2049,9 +2095,11 @@
&tp->challenge,
sizeof (struct PingMessage) -
sizeof (struct GNUNET_MessageHeader));
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Encrypting `%s' with challenge %u using key %u\n", "PONG",
ntohl (t.challenge), n->encrypt_key.crc32);
+#endif
/* trigger queue processing */
process_encrypted_neighbour_queue (n);
}
@@ -2073,9 +2121,11 @@
struct PingMessage *ping;
enum PeerStateMachine sender_status;
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Core service receives `%s' request from `%4s'.\n",
"SET_KEY", GNUNET_i2s (&n->peer));
+#endif
if (n->public_key == NULL)
{
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
@@ -2115,7 +2165,9 @@
GNUNET_break_op (0);
return;
}
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Decrypting key material.\n");
+#endif
if ((GNUNET_CRYPTO_rsa_decrypt (my_private_key,
&m->encrypted_key,
&k,
@@ -2141,8 +2193,10 @@
{
case PEER_STATE_DOWN:
n->status = PEER_STATE_KEY_RECEIVED;
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Responding to `%s' with my own key.\n", "SET_KEY");
+#endif
send_key (n);
break;
case PEER_STATE_KEY_SENT:
@@ -2151,9 +2205,11 @@
if ((sender_status != PEER_STATE_KEY_RECEIVED) &&
(sender_status != PEER_STATE_KEY_CONFIRMED))
{
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Responding to `%s' with my own key (other peer has
status %u).\n",
"SET_KEY", sender_status);
+#endif
send_key (n);
}
break;
@@ -2161,9 +2217,11 @@
if ((sender_status != PEER_STATE_KEY_RECEIVED) &&
(sender_status != PEER_STATE_KEY_CONFIRMED))
{
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Responding to `%s' with my own key (other peer has
status %u), I was already fully up.\n",
"SET_KEY", sender_status);
+#endif
send_key (n);
}
break;
@@ -2193,9 +2251,11 @@
{
struct PingMessage t;
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Core service receives `%s' request from `%4s'.\n",
"PONG", GNUNET_i2s (&n->peer));
+#endif
if (GNUNET_OK !=
do_decrypt (n,
&n->peer.hashPubKey,
@@ -2204,23 +2264,27 @@
sizeof (struct PingMessage) -
sizeof (struct GNUNET_MessageHeader)))
return;
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Decrypted `%s' from `%4s' with challenge %u using key %u\n",
"PONG",
GNUNET_i2s (&t.target),
ntohl (t.challenge), n->decrypt_key.crc32);
+#endif
if ((0 != memcmp (&t.target,
&n->peer,
sizeof (struct GNUNET_PeerIdentity))) ||
(n->ping_challenge != ntohl (t.challenge)))
{
/* PONG malformed */
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Received malfromed `%s' wanted sender `%4s' with challenge
%u\n",
"PONG", GNUNET_i2s (&n->peer), n->ping_challenge);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Received malfromed `%s' received from `%4s' with challenge
%u\n",
"PONG", GNUNET_i2s (&t.target), ntohl (t.challenge));
+#endif
GNUNET_break_op (0);
return;
}
@@ -2267,10 +2331,12 @@
char buf[msize + sizeof (struct NotifyTrafficMessage)];
struct NotifyTrafficMessage *ntm;
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Core service passes message from `%4s' of type %u to client.\n",
GNUNET_i2s(&sender->peer),
ntohs (((const struct GNUNET_MessageHeader *) m)->type));
+#endif
ntm = (struct NotifyTrafficMessage *) buf;
ntm->header.size = htons (msize + sizeof (struct NotifyTrafficMessage));
ntm->header.type = htons (GNUNET_MESSAGE_TYPE_CORE_NOTIFY_INBOUND);
@@ -2412,9 +2478,11 @@
uint32_t snum;
struct GNUNET_TIME_Absolute t;
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Core service receives `%s' request from `%4s'.\n",
"ENCRYPTED_MESSAGE", GNUNET_i2s (&n->peer));
+#endif
/* decrypt */
if (GNUNET_OK !=
do_decrypt (n,
@@ -2512,9 +2580,11 @@
uint16_t type;
uint16_t size;
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Received message of type %u from `%4s', demultiplexing.\n",
ntohs (message->type), GNUNET_i2s (peer));
+#endif
n = find_neighbour (peer);
if (n == NULL)
{
@@ -2559,9 +2629,11 @@
if ((n->status != PEER_STATE_KEY_RECEIVED) &&
(n->status != PEER_STATE_KEY_CONFIRMED))
{
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Core service receives `%s' request from `%4s' but have
not processed key; marking as pending.\n",
"PING", GNUNET_i2s (&n->peer));
+#endif
GNUNET_free_non_null (n->pending_ping);
n->pending_ping = GNUNET_malloc (sizeof (struct PingMessage));
memcpy (n->pending_ping, message, sizeof (struct PingMessage));
@@ -2641,9 +2713,11 @@
n->bpm_out_external_limit = DEFAULT_BPM_IN_OUT;
n->ping_challenge = GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK,
(uint32_t) - 1);
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Received connection from `%4s'.\n",
GNUNET_i2s (&n->peer));
+#endif
cnm.header.size = htons (sizeof (struct ConnectNotifyMessage));
cnm.header.type = htons (GNUNET_MESSAGE_TYPE_CORE_NOTIFY_CONNECT);
cnm.bpm_available = htonl (DEFAULT_BPM_IN_OUT);
@@ -2700,8 +2774,10 @@
struct Neighbour *n;
struct Neighbour *p;
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Peer `%4s' disconnected from us.\n", GNUNET_i2s (peer));
+#endif
p = NULL;
n = neighbours;
while ((n != NULL) &&
@@ -2736,11 +2812,20 @@
static void
cleaning_task (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
{
+ struct Neighbour *n;
+
+#if DEBUG_CORE
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Core service shutting down.\n");
+#endif
GNUNET_assert (transport != NULL);
GNUNET_TRANSPORT_disconnect (transport);
transport = NULL;
+ while (NULL != (n = neighbours))
+ {
+ neighbours = n->next;
+ free_neighbour (n);
+ }
}
@@ -2837,15 +2922,10 @@
static void
cleanup (void *cls, struct GNUNET_CONFIGURATION_Handle *cfg)
{
- struct Neighbour *n;
+
if (my_private_key != NULL)
GNUNET_CRYPTO_rsa_key_free (my_private_key);
- while (NULL != (n = neighbours))
- {
- neighbours = n->next;
- free_neighbour (n);
- }
/*
FIXME:
- free clients
Modified: gnunet/src/core/test_core_api.c
===================================================================
--- gnunet/src/core/test_core_api.c 2009-06-10 00:07:42 UTC (rev 8503)
+++ gnunet/src/core/test_core_api.c 2009-06-10 00:10:05 UTC (rev 8504)
@@ -34,7 +34,7 @@
#include "gnunet_scheduler_lib.h"
#include "gnunet_transport_service.h"
-#define VERBOSE GNUNET_YES
+#define VERBOSE GNUNET_NO
#define START_ARM GNUNET_YES
@@ -339,7 +339,7 @@
struct GNUNET_GETOPT_CommandLineOption options[] = {
GNUNET_GETOPT_OPTION_END
};
- sleep (1);
+ // sleep (1); /* for 'make check': allow previous processes to fully
terminate */
ok = 1;
GNUNET_PROGRAM_run ((sizeof (argv) / sizeof (char *)) - 1,
argv, "test-core-api", "nohelp", options, &run, &ok);
Modified: gnunet/src/core/test_core_api_peer1.conf
===================================================================
--- gnunet/src/core/test_core_api_peer1.conf 2009-06-10 00:07:42 UTC (rev
8503)
+++ gnunet/src/core/test_core_api_peer1.conf 2009-06-10 00:10:05 UTC (rev
8504)
@@ -9,9 +9,10 @@
[transport]
PORT = 12465
PLUGINS = tcp
-PREFIX = xterm -T transport1 -e
+#PREFIX = xterm -T transport1 -e
+#PREFIX = xterm -T transport1 -e gdb -x cmd --args
#PREFIX = xterm -T transport1 -e valgrind --tool=memcheck
-DEBUG = YES
+#DEBUG = YES
[arm]
PORT = 12466
@@ -32,9 +33,10 @@
[core]
PORT = 12470
#PREFIX = xterm -T core1 -e valgrind --tool=memcheck
+#OPTIONS = -l log-core-1
#PREFIX = xterm -T core1 -e gdb -x cmd --args
-PREFIX = xterm -T core1 -e
-DEBUG = YES
+#PREFIX = xterm -T core1 -e
+#DEBUG = YES
[testing]
WEAKRANDOM = YES
Modified: gnunet/src/core/test_core_api_peer2.conf
===================================================================
--- gnunet/src/core/test_core_api_peer2.conf 2009-06-10 00:07:42 UTC (rev
8503)
+++ gnunet/src/core/test_core_api_peer2.conf 2009-06-10 00:10:05 UTC (rev
8504)
@@ -9,9 +9,9 @@
[transport]
PORT = 22465
PLUGINS = tcp
-PREFIX = xterm -T transport2 -e
+#PREFIX = xterm -T transport2 -e
#PREFIX = xterm -T transport2 -e valgrind --tool=memcheck
-DEBUG = YES
+#DEBUG = YES
[arm]
PORT = 22466
@@ -31,9 +31,9 @@
[core]
PORT = 22470
-PREFIX = xterm -T core2 -e
+#PREFIX = xterm -T core2 -e
#PREFIX = xterm -T core2 -e valgrind --tool=memcheck
-DEBUG = YES
+#DEBUG = YES
[testing]
WEAKRANDOM = YES
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [GNUnet-SVN] r8504 - gnunet/src/core,
gnunet <=