diff options
author | Nick Mathewson <nickm@torproject.org> | 2006-10-31 19:17:07 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2006-10-31 19:17:07 +0000 |
commit | 1bf1f9d2fca917099c7e26e8f46df36329cd5c65 (patch) | |
tree | 756676cc8fc30d175869b579fad56d05a1d5ce06 /src/or/onion.c | |
parent | 058ae90539de12b2486bc4032b11bc1d79357f41 (diff) | |
download | tor-1bf1f9d2fca917099c7e26e8f46df36329cd5c65.tar tor-1bf1f9d2fca917099c7e26e8f46df36329cd5c65.tar.gz |
r9449@Kushana: nickm | 2006-10-31 00:12:02 -0500
Dump breakdown of PK operations when we get a USR2 signal. This should help us figure out of we are doing some of them for stupid reasons.
svn:r8881
Diffstat (limited to 'src/or/onion.c')
-rw-r--r-- | src/or/onion.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/src/or/onion.c b/src/or/onion.c index ba41f21a2..c9556db25 100644 --- a/src/or/onion.c +++ b/src/or/onion.c @@ -196,6 +196,8 @@ onion_skin_create(crypto_pk_env_t *dest_router_key, puts(""); #endif + note_crypto_pk_op(ENC_ONIONSKIN); + /* set meeting point, meeting cookie, etc here. Leave zero for now. */ if (crypto_pk_public_hybrid_encrypt(dest_router_key, onion_skin_out, challenge, DH_KEY_LEN, @@ -237,6 +239,7 @@ onion_skin_server_handshake(const char *onion_skin, /*ONIONSKIN_CHALLENGE_LEN*/ k = i==0?private_key:prev_private_key; if (!k) break; + note_crypto_pk_op(DEC_ONIONSKIN); len = crypto_pk_private_hybrid_decrypt(k, challenge, onion_skin, ONIONSKIN_CHALLENGE_LEN, PK_PKCS1_OAEP_PADDING,0); |