adjust bloomfilter size based on number of malicious peers
authorNathan S. Evans <evans@in.tum.de>
Tue, 25 Jan 2011 10:43:35 +0000 (10:43 +0000)
committerNathan S. Evans <evans@in.tum.de>
Tue, 25 Jan 2011 10:43:35 +0000 (10:43 +0000)
src/dht/gnunet-dht-driver.c

index 1978d1cafc20256e59ee0dbd67b06483713b74c7..456f19c3ab9523308fb3a65d8e65a17979365e06 100644 (file)
@@ -3077,7 +3077,8 @@ run (void *cls,
     }
 
   /* Create the bloomfilter for choosing which peers to set malicious */
-  malicious_bloom = GNUNET_CONTAINER_bloomfilter_init (NULL, DHT_BLOOM_SIZE * 10, DHT_BLOOM_K);
+  if (malicious_droppers > 0)
+    malicious_bloom = GNUNET_CONTAINER_bloomfilter_init (NULL, DHT_BLOOM_K * malicious_droppers, DHT_BLOOM_K);
 
   /* The normal behavior of the DHT is to do find peer requests
    * on its own.  Only if this is explicitly turned off should