X-Git-Url: https://tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Fprotocol_auth.c;h=1b061b397f9740b804be33c991b68c94409f05cb;hp=21cfc52ed7f7aa170464e8c16261d52ebba7b8f9;hb=d917c8cb6b69475d568ccbe82389b9f2b3eb5e80;hpb=58f4b845b9a7d83739af77337f2ce263d8df7838 diff --git a/src/protocol_auth.c b/src/protocol_auth.c index 21cfc52e..1b061b39 100644 --- a/src/protocol_auth.c +++ b/src/protocol_auth.c @@ -162,8 +162,8 @@ bool id_h(connection_t *c, const char *request) { c->allow_request = CONTROL; c->last_ping_time = time(NULL) + 3600; - free(c->name); - c->name = xstrdup(""); + free(c->name); + c->name = xstrdup(""); return send_request(c, "%d %d %d", ACK, TINC_CTL_VERSION_CURRENT, getpid()); } @@ -248,7 +248,7 @@ bool send_metakey(connection_t *c) { if(!cipher_open_blowfish_ofb(&c->outcipher)) return false; - + if(!digest_open_sha1(&c->outdigest, -1)) return false; @@ -302,7 +302,7 @@ bool send_metakey(connection_t *c) { cipher_get_nid(&c->outcipher), digest_get_nid(&c->outdigest), c->outmaclength, c->outcompression, hexkey); - + c->status.encryptout = true; return result; }