aboutsummaryrefslogtreecommitdiff
path: root/src/or/onion.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2006-10-31 19:17:07 +0000
committerNick Mathewson <nickm@torproject.org>2006-10-31 19:17:07 +0000
commit1bf1f9d2fca917099c7e26e8f46df36329cd5c65 (patch)
tree756676cc8fc30d175869b579fad56d05a1d5ce06 /src/or/onion.c
parent058ae90539de12b2486bc4032b11bc1d79357f41 (diff)
downloadtor-1bf1f9d2fca917099c7e26e8f46df36329cd5c65.tar
tor-1bf1f9d2fca917099c7e26e8f46df36329cd5c65.tar.gz
r9449@Kushana: nickm | 2006-10-31 00:12:02 -0500
Dump breakdown of PK operations when we get a USR2 signal. This should help us figure out of we are doing some of them for stupid reasons. svn:r8881
Diffstat (limited to 'src/or/onion.c')
-rw-r--r--src/or/onion.c3
1 files changed, 3 insertions, 0 deletions
diff --git a/src/or/onion.c b/src/or/onion.c
index ba41f21a2..c9556db25 100644
--- a/src/or/onion.c
+++ b/src/or/onion.c
@@ -196,6 +196,8 @@ onion_skin_create(crypto_pk_env_t *dest_router_key,
puts("");
#endif
+ note_crypto_pk_op(ENC_ONIONSKIN);
+
/* set meeting point, meeting cookie, etc here. Leave zero for now. */
if (crypto_pk_public_hybrid_encrypt(dest_router_key, onion_skin_out,
challenge, DH_KEY_LEN,
@@ -237,6 +239,7 @@ onion_skin_server_handshake(const char *onion_skin, /*ONIONSKIN_CHALLENGE_LEN*/
k = i==0?private_key:prev_private_key;
if (!k)
break;
+ note_crypto_pk_op(DEC_ONIONSKIN);
len = crypto_pk_private_hybrid_decrypt(k, challenge,
onion_skin, ONIONSKIN_CHALLENGE_LEN,
PK_PKCS1_OAEP_PADDING,0);