+ send_ans_key(from, to, pktkey);
+ }
+
+ /* Update our copy of the origin's packet key */
+
+ if(from->cipher_pktkey)
+ free(from->cipher_pktkey);
+
+ from->cipher_pktkey = xstrdup(pktkey);
+ keylength /= 2;
+ hex2bin(from->cipher_pktkey, from->cipher_pktkey, keylength);
+ from->cipher_pktkey[keylength] = '\0';
+
+ from->status.validkey = 1;
+ from->status.waitingforkey = 0;
+
+ flush_queue(from);
+cp
+ return 0;
+}
+
+int send_tcppacket(connection_t *cl, vpn_packet_t *packet)
+{
+ int x;
+cp
+ /* Evil hack. */
+
+ x = send_request(cl->nexthop, "%d %hd", PACKET, packet->len);
+
+ if(x)
+ return x;
+cp
+ return send_meta(cl, packet->data, packet->len);
+}
+
+int tcppacket_h(connection_t *cl)
+{
+ short int len;
+cp
+ if(sscanf(cl->buffer, "%*d %hd", &len) != 1)
+ {
+ syslog(LOG_ERR, _("Got bad PACKET from %s (%s)"), cl->name, cl->hostname);
+ return -1;