X-Git-Url: https://feistymeow.org/gitweb/?a=blobdiff_plain;f=octopi%2Flibrary%2Ftentacles%2Fencryption_infoton.cpp;h=b62507557e06ff5bda42701f977df6d689d0ad7f;hb=dc4a2619152e7f2068c8be063094765feaeecc74;hp=7cec48c7e5a2fce04e97553064dd6212a0c1693c;hpb=2952ccf47b80174880141a7ecfa122089f349b8d;p=feisty_meow.git diff --git a/octopi/library/tentacles/encryption_infoton.cpp b/octopi/library/tentacles/encryption_infoton.cpp index 7cec48c7..b6250755 100644 --- a/octopi/library/tentacles/encryption_infoton.cpp +++ b/octopi/library/tentacles/encryption_infoton.cpp @@ -105,7 +105,7 @@ bool encryption_infoton::unpack(byte_array &packed_form) outcome encryption_infoton::prepare_blowfish_key(blowfish_crypto &new_key) { -// FUNCDEF("prepare_blowfish_key"); + FUNCDEF("prepare_blowfish_key"); _encrypted_blowfish_key.reset(); // clean out stuff to create. if (!_public_key.length()) { // wrong type of request being seen or something. @@ -143,7 +143,7 @@ outcome encryption_infoton::prepare_public_key(const rsa_crypto &private_key) outcome encryption_infoton::extract_response(const rsa_crypto &private_key, blowfish_crypto &new_key) const { -// FUNCDEF("extract_response"); + FUNCDEF("extract_response"); if (_success != tentacle::OKAY) return _success; byte_array decrypted; bool worked = private_key.private_decrypt(_encrypted_blowfish_key, decrypted);