projects
/
tinc
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
The file is safe if it doesn't exist.
[tinc]
/
src
/
protocol.c
diff --git
a/src/protocol.c
b/src/protocol.c
index
1a791a7
..
087589c
100644
(file)
--- a/
src/protocol.c
+++ b/
src/protocol.c
@@
-17,7
+17,7
@@
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
- $Id: protocol.c,v 1.28.4.6
4 2000/11/22 19:55:50
guus Exp $
+ $Id: protocol.c,v 1.28.4.6
7 2000/11/25 13:33:33
guus Exp $
*/
#include "config.h"
*/
#include "config.h"
@@
-575,8
+575,6
@@
cp
if(cl->status.outgoing)
cl->allow_request = ACK;
if(cl->status.outgoing)
cl->allow_request = ACK;
- setup_vpn_connection(cl);
-
x = send_request(cl, "%d", ACK);
cl->status.encryptout = 1;
cp
x = send_request(cl, "%d", ACK);
cl->status.encryptout = 1;
cp
@@
-846,7
+844,7
@@
cp
/* Check if somebody tries to add ourself */
/* Check if somebody tries to add ourself */
- if(!strcmp(n
ew->n
ame, myself->name))
+ if(!strcmp(name, myself->name))
{
syslog(LOG_ERR, _("Warning: got ADD_HOST from %s (%s) for ourself, restarting"), cl->name, cl->hostname);
sighup = 1;
{
syslog(LOG_ERR, _("Warning: got ADD_HOST from %s (%s) for ourself, restarting"), cl->name, cl->hostname);
sighup = 1;
@@
-901,12
+899,6
@@
cp
new->status.active = 1;
new->cipher_pkttype = EVP_bf_cfb();
new->cipher_pktkeylength = cl->cipher_pkttype->key_len + cl->cipher_pkttype->iv_len;
new->status.active = 1;
new->cipher_pkttype = EVP_bf_cfb();
new->cipher_pktkeylength = cl->cipher_pkttype->key_len + cl->cipher_pkttype->iv_len;
-
- /* Okay this is a bit ugly... it would be better to setup UDP sockets dynamically, or
- * perhaps just one UDP socket... but then again, this has benefits too...
- */
-
- setup_vpn_connection(new);
cp
return 0;
}
cp
return 0;
}
@@
-1258,8
+1250,8
@@
cp
from->cipher_pktkey = xstrdup(pktkey);
keylength /= 2;
from->cipher_pktkey = xstrdup(pktkey);
keylength /= 2;
- hex2bin(
pktkey,
pktkey, keylength);
- pktkey[keylength] = '\0';
+ hex2bin(
from->cipher_pktkey, from->cipher_
pktkey, keylength);
+
from->cipher_
pktkey[keylength] = '\0';
from->status.validkey = 1;
from->status.waitingforkey = 0;
from->status.validkey = 1;
from->status.waitingforkey = 0;