X-Git-Url: https://tinc-vpn.org/git/browse?a=blobdiff_plain;f=src%2Fprotocol_auth.c;h=1b061b397f9740b804be33c991b68c94409f05cb;hb=d917c8cb6b69475d568ccbe82389b9f2b3eb5e80;hp=59917c6c93f254a39af173c2564406e6f360b9d6;hpb=ff306f0cdaedb50de1472e7c1fb55de922a6ca60;p=tinc diff --git a/src/protocol_auth.c b/src/protocol_auth.c index 59917c6c..1b061b39 100644 --- a/src/protocol_auth.c +++ b/src/protocol_auth.c @@ -162,8 +162,8 @@ bool id_h(connection_t *c, const char *request) { c->allow_request = CONTROL; c->last_ping_time = time(NULL) + 3600; - free(c->name); - c->name = xstrdup(""); + free(c->name); + c->name = xstrdup(""); return send_request(c, "%d %d %d", ACK, TINC_CTL_VERSION_CURRENT, getpid()); } @@ -248,7 +248,7 @@ bool send_metakey(connection_t *c) { if(!cipher_open_blowfish_ofb(&c->outcipher)) return false; - + if(!digest_open_sha1(&c->outdigest, -1)) return false; @@ -302,7 +302,7 @@ bool send_metakey(connection_t *c) { cipher_get_nid(&c->outcipher), digest_get_nid(&c->outdigest), c->outmaclength, c->outcompression, hexkey); - + c->status.encryptout = true; return result; } @@ -508,34 +508,21 @@ bool send_ack(connection_t *c) { } static void send_everything(connection_t *c) { - splay_node_t *node, *node2; - node_t *n; - subnet_t *s; - edge_t *e; - /* Send all known subnets and edges */ if(tunnelserver) { - for(node = myself->subnet_tree->head; node; node = node->next) { - s = node->data; + for splay_each(subnet_t, s, myself->subnet_tree) send_add_subnet(c, s); - } return; } - for(node = node_tree->head; node; node = node->next) { - n = node->data; - - for(node2 = n->subnet_tree->head; node2; node2 = node2->next) { - s = node2->data; + for splay_each(node_t, n, node_tree) { + for splay_each(subnet_t, s, n->subnet_tree) send_add_subnet(c, s); - } - for(node2 = n->edge_tree->head; node2; node2 = node2->next) { - e = node2->data; + for splay_each(edge_t, e, n->edge_tree) send_add_edge(c, e); - } } }