/**
* Number of other malicious peers
*/
-static uint32_t num_mal_peers = 0;
+static uint32_t num_mal_peers;
/**
uint32_t size_needed;
struct ClientContext *cli_ctx;
+ GNUNET_assert (NULL != reply_cls);
LOG (GNUNET_ERROR_TYPE_DEBUG,
"sampler returned %" PRIu32 " peers:\n",
num_peers);
GNUNET_break_op (0);
GNUNET_SERVER_receive_done (client,
GNUNET_SYSERR);
+ return;
}
LOG (GNUNET_ERROR_TYPE_DEBUG,
LOG (GNUNET_ERROR_TYPE_DEBUG, "Going to execute next round maliciously type %" PRIu32 ".\n",
mal_type);
+ GNUNET_assert (mal_type <= 3);
/* Do malicious actions */
if (1 == mal_type)
{ /* Try to maximise representation */
*/
uint32_t num_peers GNUNET_PACKED;
- /* Followed by num_peers * GNUNET_PeerIdentity */
+ /* Followed by num_peers * GNUNET_PeerIdentity when the type of malicious
+ behaviour is 1 */
};
#endif /* ENABLE_MALICIOUS */
rps_peers[i].index = i;
rps_peers[i].op =
GNUNET_TESTBED_service_connect (&rps_peers[i],
- peers[i],
- "rps",
- &rps_connect_complete_cb,
- &rps_peers[i],
- &rps_connect_adapter,
- &rps_disconnect_adapter,
- &rps_peers[i]);
+ peers[i],
+ "rps",
+ &rps_connect_complete_cb,
+ &rps_peers[i],
+ &rps_connect_adapter,
+ &rps_disconnect_adapter,
+ &rps_peers[i]);
}
-
- if (NULL != churn_task)
- GNUNET_SCHEDULER_cancel (churn_task);
-
GNUNET_SCHEDULER_add_delayed (timeout, &shutdown_task, NULL);
}