+ choice = true;
+ get_config_bool(lookup_config(&config_tree, "ClampMSS"), &choice);
+
+ if(choice) {
+ myself->options |= OPTION_CLAMP_MSS;
+ }
+
+ get_config_bool(lookup_config(&config_tree, "PriorityInheritance"), &priorityinheritance);
+ get_config_bool(lookup_config(&config_tree, "DecrementTTL"), &decrement_ttl);
+
+ char *bmode = NULL;
+
+ if(get_config_string(lookup_config(&config_tree, "Broadcast"), &bmode)) {
+ if(!strcasecmp(bmode, "no")) {
+ broadcast_mode = BMODE_NONE;
+ } else if(!strcasecmp(bmode, "yes") || !strcasecmp(bmode, "mst")) {
+ broadcast_mode = BMODE_MST;
+ } else if(!strcasecmp(bmode, "direct")) {
+ broadcast_mode = BMODE_DIRECT;
+ } else {
+ logger(DEBUG_ALWAYS, LOG_ERR, "Invalid broadcast mode!");
+ free(bmode);
+ return false;
+ }
+
+ free(bmode);
+ }
+
+ /* Delete all broadcast subnets before re-adding them */
+
+ for splay_each(subnet_t, s, &subnet_tree) {
+ if(!s->owner) {
+ splay_delete_node(&subnet_tree, node);
+ }
+ }
+
+ const char *const DEFAULT_BROADCAST_SUBNETS[] = { "ff:ff:ff:ff:ff:ff", "255.255.255.255", "224.0.0.0/4", "ff00::/8" };
+
+ for(size_t i = 0; i < sizeof(DEFAULT_BROADCAST_SUBNETS) / sizeof(*DEFAULT_BROADCAST_SUBNETS); i++) {
+ subnet_t *s = new_subnet();
+
+ if(!str2net(s, DEFAULT_BROADCAST_SUBNETS[i])) {
+ abort();
+ }
+
+ subnet_add(NULL, s);
+ }
+
+ for(config_t *cfg = lookup_config(&config_tree, "BroadcastSubnet"); cfg; cfg = lookup_config_next(&config_tree, cfg)) {
+ subnet_t *s;
+
+ if(!get_config_subnet(cfg, &s)) {
+ continue;
+ }
+
+ subnet_add(NULL, s);
+ }
+
+#if !defined(IP_TOS)
+
+ if(priorityinheritance) {
+ logger(DEBUG_ALWAYS, LOG_WARNING, "%s not supported on this platform for IPv4 connections", "PriorityInheritance");
+ }
+
+#endif
+
+#if !defined(IPV6_TCLASS)
+
+ if(priorityinheritance) {
+ logger(DEBUG_ALWAYS, LOG_WARNING, "%s not supported on this platform for IPv6 connections", "PriorityInheritance");
+ }
+
+#endif
+
+ if(!get_config_int(lookup_config(&config_tree, "MACExpire"), &macexpire)) {
+ macexpire = 600;
+ }
+
+ if(get_config_int(lookup_config(&config_tree, "MaxTimeout"), &maxtimeout)) {
+ if(maxtimeout <= 0) {
+ logger(DEBUG_ALWAYS, LOG_ERR, "Bogus maximum timeout!");
+ return false;
+ }
+ } else {
+ maxtimeout = 900;
+ }
+
+ char *afname = NULL;
+
+ if(get_config_string(lookup_config(&config_tree, "AddressFamily"), &afname)) {
+ if(!strcasecmp(afname, "IPv4")) {
+ addressfamily = AF_INET;
+ } else if(!strcasecmp(afname, "IPv6")) {
+ addressfamily = AF_INET6;
+ } else if(!strcasecmp(afname, "any")) {
+ addressfamily = AF_UNSPEC;
+ } else {
+ logger(DEBUG_ALWAYS, LOG_ERR, "Invalid address family!");
+ free(afname);
+ return false;
+ }
+
+ free(afname);
+ }
+
+ get_config_bool(lookup_config(&config_tree, "Hostnames"), &hostnames);
+
+ if(!get_config_int(lookup_config(&config_tree, "KeyExpire"), &keylifetime)) {
+ keylifetime = 3600;
+ }
+
+ if(!get_config_bool(lookup_config(&config_tree, "AutoConnect"), &autoconnect)) {
+ autoconnect = true;
+ }
+
+ get_config_bool(lookup_config(&config_tree, "DisableBuggyPeers"), &disablebuggypeers);
+
+ if(!get_config_int(lookup_config(&config_tree, "InvitationExpire"), &invitation_lifetime)) {
+ invitation_lifetime = 604800; // 1 week
+ }
+
+ read_invitation_key();
+
+ return true;
+}
+
+// Get the port that `from_fd` is listening on, and assign it to
+// `sa` if `sa` has a dynamically allocated (zero) port.
+static bool assign_static_port(sockaddr_t *sa, int from_fd) {
+ // We cannot get a port from a bad FD. Bail out.
+ if(from_fd <= 0) {