summaryrefslogtreecommitdiff
path: root/usr.sbin
diff options
context:
space:
mode:
authorHenning Brauer <henning@cvs.openbsd.org>2004-01-31 21:09:16 +0000
committerHenning Brauer <henning@cvs.openbsd.org>2004-01-31 21:09:16 +0000
commit1a2de2f741160154ad94252912302fc4a213be87 (patch)
tree691532660d175f3cc91524124eeffecb2966e3f0 /usr.sbin
parenta370588ba80f172c769c599cdff220f6a6ae29f7 (diff)
rename tcp sockopt TCP_SIGNATURE_ENABLE to TCP_MD5SIG
requested by theo ok markus@ hshoexer@
Diffstat (limited to 'usr.sbin')
-rw-r--r--usr.sbin/bgpd/session.c15
1 files changed, 7 insertions, 8 deletions
diff --git a/usr.sbin/bgpd/session.c b/usr.sbin/bgpd/session.c
index 90ae940ffdf..cdd7dee33c7 100644
--- a/usr.sbin/bgpd/session.c
+++ b/usr.sbin/bgpd/session.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: session.c,v 1.105 2004/01/30 11:40:41 henning Exp $ */
+/* $OpenBSD: session.c,v 1.106 2004/01/31 21:09:15 henning Exp $ */
/*
* Copyright (c) 2003, 2004 Henning Brauer <henning@openbsd.org>
@@ -117,9 +117,8 @@ setup_listener(void)
opt = 1;
if (setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, &opt, sizeof(opt)) == -1)
fatal("setsockopt SO_REUSEPORT");
- if (setsockopt(fd, IPPROTO_TCP, TCP_SIGNATURE_ENABLE, &opt,
- sizeof(opt)) == -1)
- fatal("setsockopt TCPSIGNATURE_ENABLE");
+ if (setsockopt(fd, IPPROTO_TCP, TCP_MD5SIG, &opt, sizeof(opt)) == -1)
+ fatal("setsockopt TCP_MD5SIG");
if (bind(fd, (struct sockaddr *)&conf->listen_addr,
sizeof(conf->listen_addr))) {
@@ -730,9 +729,9 @@ session_accept(int listenfd)
}
if (p->conf.tcp_md5_key[0]) {
len = sizeof(opt);
- if (getsockopt(connfd, IPPROTO_TCP,
- TCP_SIGNATURE_ENABLE, &opt, &len) == -1)
- fatal("getsockopt TCP_SIGNATURE_ENABLE");
+ if (getsockopt(connfd, IPPROTO_TCP, TCP_MD5SIG,
+ &opt, &len) == -1)
+ fatal("getsockopt TCP_MD5SIG");
if (!opt) { /* non-md5'd connection! */
log_peer_warnx(&p->conf,
"connection attempt without md5 signature");
@@ -777,7 +776,7 @@ session_connect(struct peer *peer)
}
if (peer->conf.tcp_md5_key[0])
- if (setsockopt(peer->sock, IPPROTO_TCP, TCP_SIGNATURE_ENABLE,
+ if (setsockopt(peer->sock, IPPROTO_TCP, TCP_MD5SIG,
&opt, sizeof(opt)) == -1) {
log_peer_warn(&peer->conf, "setsockopt md5sig");
bgp_fsm(peer, EVNT_CON_OPENFAIL);