- B2BFEE16A02F0AD104FBE59958BE80D27FC59C50695D25B4C008C28ABA4438C00706C3181C473C7A74BD85F21A681059B694B3B792F7C234D3478B346307EB7C
+ B6619F974D8EFC25C60EB441BE028EC57EB693EFB6E97188590572213D8061145EDE293212D0CBC9112CA5C5AFE4D278D7F6D10B12938663BC2E6D7DD0AC6EE0
blatta/lib/direct.py
(41 . 18)(41 . 16)
36 self.log_outgoing(target_peer)
37
38 def retry(self, requesting_peer):
39 target_peer = self.state.get_peer_by_handle(self.handle)
40
41 if target_peer == None:
42 logging.debug("Aborting message: unknown handle: %s" % self.handle)
43 if requesting_peer == None:
44 logging.debug("Aborting message: unknown peer: %s" % requesting_peer.handles[0])
45 return
46
47 if not target_peer.get_key():
48 logging.debug("No key for peer associated with %s" % self.handle)
49 if not requesting_peer.get_key():
50 logging.debug("No key for peer associated with %s" % requesting_peer.handles[0])
51 return
52
53 # TODO: Figure out how to verify that the requester was the original intended recipient
54 signed_packet_bytes = self.pack(target_peer, self.command, self.bounces, self.message_bytes)
55 target_peer.send(signed_packet_bytes)
56 self.log_outgoing(target_peer)
57 signed_packet_bytes = self.pack(requesting_peer, self.command, self.bounces, self.message_bytes)
58 requesting_peer.send(signed_packet_bytes)
59 self.log_outgoing(requesting_peer)
60