diff options
author | Nick Mathewson <nickm@torproject.org> | 2006-10-31 19:17:07 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2006-10-31 19:17:07 +0000 |
commit | 1bf1f9d2fca917099c7e26e8f46df36329cd5c65 (patch) | |
tree | 756676cc8fc30d175869b579fad56d05a1d5ce06 /src/or/rendclient.c | |
parent | 058ae90539de12b2486bc4032b11bc1d79357f41 (diff) | |
download | tor-1bf1f9d2fca917099c7e26e8f46df36329cd5c65.tar.gz tor-1bf1f9d2fca917099c7e26e8f46df36329cd5c65.zip |
r9449@Kushana: nickm | 2006-10-31 00:12:02 -0500
Dump breakdown of PK operations when we get a USR2 signal. This should help us figure out of we are doing some of them for stupid reasons.
svn:r8881
Diffstat (limited to 'src/or/rendclient.c')
-rw-r--r-- | src/or/rendclient.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/src/or/rendclient.c b/src/or/rendclient.c index 7297f1b981..4d0cdd9fc3 100644 --- a/src/or/rendclient.c +++ b/src/or/rendclient.c @@ -129,6 +129,7 @@ rend_client_send_introduction(origin_circuit_t *introcirc, goto err; } + note_crypto_pk_op(REND_CLIENT); /*XXX maybe give crypto_pk_public_hybrid_encrypt a max_len arg, * to avoid buffer overflows? */ r = crypto_pk_public_hybrid_encrypt(entry->parsed->pk, payload+DIGEST_LEN, |