diff options
author | Nick Mathewson <nickm@torproject.org> | 2006-10-31 19:17:07 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2006-10-31 19:17:07 +0000 |
commit | 1bf1f9d2fca917099c7e26e8f46df36329cd5c65 (patch) | |
tree | 756676cc8fc30d175869b579fad56d05a1d5ce06 /src/or/rendservice.c | |
parent | 058ae90539de12b2486bc4032b11bc1d79357f41 (diff) | |
download | tor-1bf1f9d2fca917099c7e26e8f46df36329cd5c65.tar.gz tor-1bf1f9d2fca917099c7e26e8f46df36329cd5c65.zip |
r9449@Kushana: nickm | 2006-10-31 00:12:02 -0500
Dump breakdown of PK operations when we get a USR2 signal. This should help us figure out of we are doing some of them for stupid reasons.
svn:r8881
Diffstat (limited to 'src/or/rendservice.c')
-rw-r--r-- | src/or/rendservice.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/src/or/rendservice.c b/src/or/rendservice.c index 984bf7e7cd..d53fd45f23 100644 --- a/src/or/rendservice.c +++ b/src/or/rendservice.c @@ -471,6 +471,7 @@ rend_service_introduce(origin_circuit_t *circuit, const char *request, return -1; } /* Next N bytes is encrypted with service key */ + note_crypto_pk_op(REND_SERVER); r = crypto_pk_private_hybrid_decrypt( service->private_key,buf,request+DIGEST_LEN,request_len-DIGEST_LEN, PK_PKCS1_OAEP_PADDING,1); @@ -756,6 +757,7 @@ rend_service_intro_has_opened(origin_circuit_t *circuit) if (crypto_digest(buf+len, auth, DIGEST_LEN+9)) goto err; len += 20; + note_crypto_pk_op(REND_SERVER); r = crypto_pk_private_sign_digest(service->private_key, buf+len, buf, len); if (r<0) { log_warn(LD_BUG, "Internal error: couldn't sign introduction request."); |