diff options
author | Christian Grothoff <christian@grothoff.org> | 2011-08-14 20:05:17 +0000 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2011-08-14 20:05:17 +0000 |
commit | 89975a4c15ba6829bcf10e3287aac013d2f58973 (patch) | |
tree | c06477a31ff8dead4cf88d6fd8ca73520206cfda /src/vpn/gnunet-daemon-vpn.c | |
parent | 7884866ee7cf796384342d104944256192d774a0 (diff) | |
download | gnunet-89975a4c15ba6829bcf10e3287aac013d2f58973.tar.gz gnunet-89975a4c15ba6829bcf10e3287aac013d2f58973.zip |
stuff
Diffstat (limited to 'src/vpn/gnunet-daemon-vpn.c')
-rw-r--r-- | src/vpn/gnunet-daemon-vpn.c | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/src/vpn/gnunet-daemon-vpn.c b/src/vpn/gnunet-daemon-vpn.c index 1e1e957d8..15ed379df 100644 --- a/src/vpn/gnunet-daemon-vpn.c +++ b/src/vpn/gnunet-daemon-vpn.c | |||
@@ -812,7 +812,7 @@ receive_udp_back (void *cls | |||
812 | 812 | ||
813 | GNUNET_assert (pkt6 != NULL); | 813 | GNUNET_assert (pkt6 != NULL); |
814 | 814 | ||
815 | if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_SERVICE_UDP_BACK) | 815 | if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_SERVICE_UDP_BACK) |
816 | new_ip6addr (pkt6->ip6_hdr.sadr, &other->hashPubKey, desc); | 816 | new_ip6addr (pkt6->ip6_hdr.sadr, &other->hashPubKey, desc); |
817 | else | 817 | else |
818 | new_ip6addr_remote (pkt6->ip6_hdr.sadr, s->addr, s->addrlen); | 818 | new_ip6addr_remote (pkt6->ip6_hdr.sadr, s->addr, s->addrlen); |
@@ -857,7 +857,7 @@ receive_udp_back (void *cls | |||
857 | GNUNET_free (key); | 857 | GNUNET_free (key); |
858 | 858 | ||
859 | GNUNET_assert (me != NULL); | 859 | GNUNET_assert (me != NULL); |
860 | if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_SERVICE_UDP_BACK) | 860 | if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_SERVICE_UDP_BACK) |
861 | { | 861 | { |
862 | GNUNET_assert (me->desc. | 862 | GNUNET_assert (me->desc. |
863 | service_type & htonl (GNUNET_DNS_SERVICE_TYPE_UDP)); | 863 | service_type & htonl (GNUNET_DNS_SERVICE_TYPE_UDP)); |
@@ -897,7 +897,7 @@ receive_udp_back (void *cls | |||
897 | 897 | ||
898 | GNUNET_assert (pkt4 != NULL); | 898 | GNUNET_assert (pkt4 != NULL); |
899 | 899 | ||
900 | GNUNET_assert (ntohs (message->type) == GNUNET_MESSAGE_TYPE_REMOTE_UDP_BACK); | 900 | GNUNET_assert (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_REMOTE_UDP_BACK); |
901 | uint32_t sadr; | 901 | uint32_t sadr; |
902 | new_ip4addr_remote ((unsigned char*)&sadr, s->addr, s->addrlen); | 902 | new_ip4addr_remote ((unsigned char*)&sadr, s->addr, s->addrlen); |
903 | pkt4->ip_hdr.sadr = sadr; | 903 | pkt4->ip_hdr.sadr = sadr; |
@@ -984,7 +984,7 @@ receive_tcp_back (void *cls __attribute__((unused)), struct GNUNET_MESH_Tunnel* | |||
984 | 984 | ||
985 | GNUNET_assert (pkt6 != NULL); | 985 | GNUNET_assert (pkt6 != NULL); |
986 | 986 | ||
987 | if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_SERVICE_TCP_BACK) | 987 | if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_SERVICE_TCP_BACK) |
988 | new_ip6addr (pkt6->ip6_hdr.sadr, &other->hashPubKey, desc); | 988 | new_ip6addr (pkt6->ip6_hdr.sadr, &other->hashPubKey, desc); |
989 | else | 989 | else |
990 | new_ip6addr_remote (pkt6->ip6_hdr.sadr, s->addr, s->addrlen); | 990 | new_ip6addr_remote (pkt6->ip6_hdr.sadr, s->addr, s->addrlen); |
@@ -1025,7 +1025,7 @@ receive_tcp_back (void *cls __attribute__((unused)), struct GNUNET_MESH_Tunnel* | |||
1025 | GNUNET_free (key); | 1025 | GNUNET_free (key); |
1026 | 1026 | ||
1027 | GNUNET_assert (me != NULL); | 1027 | GNUNET_assert (me != NULL); |
1028 | if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_SERVICE_UDP_BACK) | 1028 | if (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_SERVICE_UDP_BACK) |
1029 | GNUNET_assert (me->desc. | 1029 | GNUNET_assert (me->desc. |
1030 | service_type & htonl (GNUNET_DNS_SERVICE_TYPE_TCP)); | 1030 | service_type & htonl (GNUNET_DNS_SERVICE_TYPE_TCP)); |
1031 | 1031 | ||
@@ -1058,7 +1058,7 @@ receive_tcp_back (void *cls __attribute__((unused)), struct GNUNET_MESH_Tunnel* | |||
1058 | GNUNET_assert (pkt4 != NULL); | 1058 | GNUNET_assert (pkt4 != NULL); |
1059 | memset (pkt4, 0, size); | 1059 | memset (pkt4, 0, size); |
1060 | 1060 | ||
1061 | GNUNET_assert (ntohs (message->type) == GNUNET_MESSAGE_TYPE_REMOTE_TCP_BACK); | 1061 | GNUNET_assert (ntohs (message->type) == GNUNET_MESSAGE_TYPE_VPN_REMOTE_TCP_BACK); |
1062 | uint32_t sadr; | 1062 | uint32_t sadr; |
1063 | new_ip4addr_remote ((unsigned char*)&sadr, s->addr, s->addrlen); | 1063 | new_ip4addr_remote ((unsigned char*)&sadr, s->addr, s->addrlen); |
1064 | pkt4->ip_hdr.sadr = sadr; | 1064 | pkt4->ip_hdr.sadr = sadr; |
@@ -1149,10 +1149,10 @@ run (void *cls, | |||
1149 | const struct GNUNET_CONFIGURATION_Handle *cfg_) | 1149 | const struct GNUNET_CONFIGURATION_Handle *cfg_) |
1150 | { | 1150 | { |
1151 | static const struct GNUNET_MESH_MessageHandler handlers[] = { | 1151 | static const struct GNUNET_MESH_MessageHandler handlers[] = { |
1152 | {receive_udp_back, GNUNET_MESSAGE_TYPE_SERVICE_UDP_BACK, 0}, | 1152 | {receive_udp_back, GNUNET_MESSAGE_TYPE_VPN_SERVICE_UDP_BACK, 0}, |
1153 | {receive_tcp_back, GNUNET_MESSAGE_TYPE_SERVICE_TCP_BACK, 0}, | 1153 | {receive_tcp_back, GNUNET_MESSAGE_TYPE_VPN_SERVICE_TCP_BACK, 0}, |
1154 | {receive_udp_back, GNUNET_MESSAGE_TYPE_REMOTE_UDP_BACK, 0}, | 1154 | {receive_udp_back, GNUNET_MESSAGE_TYPE_VPN_REMOTE_UDP_BACK, 0}, |
1155 | {receive_tcp_back, GNUNET_MESSAGE_TYPE_REMOTE_TCP_BACK, 0}, | 1155 | {receive_tcp_back, GNUNET_MESSAGE_TYPE_VPN_REMOTE_TCP_BACK, 0}, |
1156 | {NULL, 0, 0} | 1156 | {NULL, 0, 0} |
1157 | }; | 1157 | }; |
1158 | 1158 | ||