diff options
author | Henning Brauer <henning@cvs.openbsd.org> | 2004-01-31 21:09:16 +0000 |
---|---|---|
committer | Henning Brauer <henning@cvs.openbsd.org> | 2004-01-31 21:09:16 +0000 |
commit | 1a2de2f741160154ad94252912302fc4a213be87 (patch) | |
tree | 691532660d175f3cc91524124eeffecb2966e3f0 /usr.sbin | |
parent | a370588ba80f172c769c599cdff220f6a6ae29f7 (diff) |
rename tcp sockopt TCP_SIGNATURE_ENABLE to TCP_MD5SIG
requested by theo
ok markus@ hshoexer@
Diffstat (limited to 'usr.sbin')
-rw-r--r-- | usr.sbin/bgpd/session.c | 15 |
1 files changed, 7 insertions, 8 deletions
diff --git a/usr.sbin/bgpd/session.c b/usr.sbin/bgpd/session.c index 90ae940ffdf..cdd7dee33c7 100644 --- a/usr.sbin/bgpd/session.c +++ b/usr.sbin/bgpd/session.c @@ -1,4 +1,4 @@ -/* $OpenBSD: session.c,v 1.105 2004/01/30 11:40:41 henning Exp $ */ +/* $OpenBSD: session.c,v 1.106 2004/01/31 21:09:15 henning Exp $ */ /* * Copyright (c) 2003, 2004 Henning Brauer <henning@openbsd.org> @@ -117,9 +117,8 @@ setup_listener(void) opt = 1; if (setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, &opt, sizeof(opt)) == -1) fatal("setsockopt SO_REUSEPORT"); - if (setsockopt(fd, IPPROTO_TCP, TCP_SIGNATURE_ENABLE, &opt, - sizeof(opt)) == -1) - fatal("setsockopt TCPSIGNATURE_ENABLE"); + if (setsockopt(fd, IPPROTO_TCP, TCP_MD5SIG, &opt, sizeof(opt)) == -1) + fatal("setsockopt TCP_MD5SIG"); if (bind(fd, (struct sockaddr *)&conf->listen_addr, sizeof(conf->listen_addr))) { @@ -730,9 +729,9 @@ session_accept(int listenfd) } if (p->conf.tcp_md5_key[0]) { len = sizeof(opt); - if (getsockopt(connfd, IPPROTO_TCP, - TCP_SIGNATURE_ENABLE, &opt, &len) == -1) - fatal("getsockopt TCP_SIGNATURE_ENABLE"); + if (getsockopt(connfd, IPPROTO_TCP, TCP_MD5SIG, + &opt, &len) == -1) + fatal("getsockopt TCP_MD5SIG"); if (!opt) { /* non-md5'd connection! */ log_peer_warnx(&p->conf, "connection attempt without md5 signature"); @@ -777,7 +776,7 @@ session_connect(struct peer *peer) } if (peer->conf.tcp_md5_key[0]) - if (setsockopt(peer->sock, IPPROTO_TCP, TCP_SIGNATURE_ENABLE, + if (setsockopt(peer->sock, IPPROTO_TCP, TCP_MD5SIG, &opt, sizeof(opt)) == -1) { log_peer_warn(&peer->conf, "setsockopt md5sig"); bgp_fsm(peer, EVNT_CON_OPENFAIL); |