[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[GNUnet-SVN] r16055 - gnunet/src/nse
From: |
gnunet |
Subject: |
[GNUnet-SVN] r16055 - gnunet/src/nse |
Date: |
Sun, 17 Jul 2011 23:39:48 +0200 |
Author: nevans
Date: 2011-07-17 23:39:48 +0200 (Sun, 17 Jul 2011)
New Revision: 16055
Modified:
gnunet/src/nse/nse.h
Log:
remove crap
Modified: gnunet/src/nse/nse.h
===================================================================
--- gnunet/src/nse/nse.h 2011-07-17 16:31:56 UTC (rev 16054)
+++ gnunet/src/nse/nse.h 2011-07-17 21:39:48 UTC (rev 16055)
@@ -66,28 +66,6 @@
* Network size estimate reply; sent when "this"
* peer's timer has run out before receiving a
* valid reply from another peer.
- *
- * FIXME: Is this the right way to do this?
- * I think we need to include both the public
- * key and the timestamp signed by the private
- * key. This way a recipient
- * can verify that the peer at least generated
- * the public/private key pair, and that the
- * timestamp matches what the current peer
- * believes it should be. The receiving peer
- * would then check whether the XOR of the peer
- * identity and the timestamp is within a
- * reasonable range of the current time
- * (+/- N seconds). If a closer message which
- * also verifies hasn't been received (or this
- * message is a duplicate), the peer
- * calculates the size estimate and forwards
- * the request to all other peers.
- *
- * Hmm... Is it enought to *just* send the peer
- * identity? Obviously this is smaller, but it
- * doesn't allow us to verify that the
- * public/private key pair were generated, right?
*/
struct GNUNET_NSE_FloodMessage
{
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [GNUnet-SVN] r16055 - gnunet/src/nse,
gnunet <=