X-Git-Url: https://tinc-vpn.org/git/browse?a=blobdiff_plain;f=src%2Fmeta.c;h=4282a4e6bd7a63d25b42b3cade4cb1d2eb37b433;hb=d6b45d005530496e48325a6174ecdd889a17bfc1;hp=5b47aa6675a580cf2a645d1b5e98802516d64de0;hpb=f6e87ab476a0faf8b124ecaaa27f967d825e6457;p=tinc diff --git a/src/meta.c b/src/meta.c index 5b47aa66..4282a4e6 100644 --- a/src/meta.c +++ b/src/meta.c @@ -1,6 +1,6 @@ /* meta.c -- handle the meta communication - Copyright (C) 2000-2014 Guus Sliepen , + Copyright (C) 2000-2018 Guus Sliepen , 2000-2005 Ivo Timmermans 2006 Scott Lamb @@ -31,10 +31,13 @@ #include "xalloc.h" #ifndef MIN -#define MIN(x, y) (((x)<(y))?(x):(y)) +static ssize_t MIN(ssize_t x, ssize_t y) { + return x < y ? x : y; +} #endif bool send_meta_sptps(void *handle, uint8_t type, const void *buffer, size_t length) { + (void)type; connection_t *c = handle; if(!c) { @@ -48,13 +51,13 @@ bool send_meta_sptps(void *handle, uint8_t type, const void *buffer, size_t leng return true; } -bool send_meta(connection_t *c, const char *buffer, int length) { +bool send_meta(connection_t *c, const char *buffer, size_t length) { if(!c) { logger(DEBUG_ALWAYS, LOG_ERR, "send_meta() called with NULL pointer!"); abort(); } - logger(DEBUG_META, LOG_DEBUG, "Sending %d bytes of metadata to %s (%s)", length, + logger(DEBUG_META, LOG_DEBUG, "Sending %lu bytes of metadata to %s (%s)", (unsigned long)length, c->name, c->hostname); if(c->protocol_minor >= 2) { @@ -92,13 +95,13 @@ bool send_meta(connection_t *c, const char *buffer, int length) { return true; } -void send_meta_raw(connection_t *c, const char *buffer, int length) { +void send_meta_raw(connection_t *c, const char *buffer, size_t length) { if(!c) { logger(DEBUG_ALWAYS, LOG_ERR, "send_meta() called with NULL pointer!"); abort(); } - logger(DEBUG_META, LOG_DEBUG, "Sending %d bytes of raw metadata to %s (%s)", length, + logger(DEBUG_META, LOG_DEBUG, "Sending %lu bytes of raw metadata to %s (%s)", (unsigned long)length, c->name, c->hostname); buffer_add(&c->outbuf, buffer, length); @@ -106,7 +109,7 @@ void send_meta_raw(connection_t *c, const char *buffer, int length) { io_set(&c->io, IO_READ | IO_WRITE); } -void broadcast_meta(connection_t *from, const char *buffer, int length) { +void broadcast_meta(connection_t *from, const char *buffer, size_t length) { for list_each(connection_t, c, connection_list) if(c != from && c->edge) { send_meta(c, buffer, length); @@ -158,7 +161,7 @@ bool receive_meta_sptps(void *handle, uint8_t type, const void *vdata, uint16_t } bool receive_meta(connection_t *c) { - int inlen; + ssize_t inlen; char inbuf[MAXBUFSIZE]; char *bufp = inbuf, *endp; @@ -197,7 +200,7 @@ bool receive_meta(connection_t *c) { /* Are we receiving a SPTPS packet? */ if(c->sptpslen) { - int len = MIN(inlen, c->sptpslen - c->inbuf.len); + ssize_t len = MIN(inlen, c->sptpslen - c->inbuf.len); buffer_add(&c->inbuf, bufp, len); char *sptpspacket = buffer_read(&c->inbuf, c->sptpslen); @@ -218,7 +221,7 @@ bool receive_meta(connection_t *c) { } if(c->protocol_minor >= 2) { - int len = sptps_receive_data(&c->sptps, bufp, inlen); + size_t len = sptps_receive_data(&c->sptps, bufp, inlen); if(!len) { return false; @@ -247,8 +250,8 @@ bool receive_meta(connection_t *c) { return false; #else - if(inlen > c->inbudget) { - logger(DEBUG_META, LOG_ERR, "yte limit exceeded for decryption from %s (%s)", c->name, c->hostname); + if((size_t)inlen > c->inbudget) { + logger(DEBUG_META, LOG_ERR, "Byte limit exceeded for decryption from %s (%s)", c->name, c->hostname); return false; } else { c->inbudget -= inlen; @@ -256,7 +259,7 @@ bool receive_meta(connection_t *c) { size_t outlen = inlen; - if(!cipher_decrypt(c->incipher, bufp, inlen, buffer_prepare(&c->inbuf, inlen), &outlen, false) || inlen != outlen) { + if(!cipher_decrypt(c->incipher, bufp, inlen, buffer_prepare(&c->inbuf, inlen), &outlen, false) || (size_t)inlen != outlen) { logger(DEBUG_ALWAYS, LOG_ERR, "Error while decrypting metadata from %s (%s)", c->name, c->hostname); return false;