summaryrefslogtreecommitdiffstats
path: root/sysdep/unix
diff options
context:
space:
mode:
Diffstat (limited to 'sysdep/unix')
-rw-r--r--sysdep/unix/endian.h3
-rw-r--r--sysdep/unix/io.c37
-rw-r--r--sysdep/unix/krt.c2
3 files changed, 4 insertions, 38 deletions
diff --git a/sysdep/unix/endian.h b/sysdep/unix/endian.h
index 58c746f..bc48631 100644
--- a/sysdep/unix/endian.h
+++ b/sysdep/unix/endian.h
@@ -13,5 +13,8 @@
#include <sys/types.h>
#include <netinet/in.h>
+#ifdef HAVE_STDINT_H
+#include <stdint.h>
+#endif
#endif
diff --git a/sysdep/unix/io.c b/sysdep/unix/io.c
index b6c7f84..50992fb 100644
--- a/sysdep/unix/io.c
+++ b/sysdep/unix/io.c
@@ -738,43 +738,6 @@ sk_set_ttl(sock *s, int ttl)
}
-/* FIXME: check portability */
-
-static int
-sk_set_md5_auth_int(sock *s, sockaddr *sa, char *passwd)
-{
- struct tcp_md5sig md5;
-
- memset(&md5, 0, sizeof(md5));
- memcpy(&md5.tcpm_addr, (struct sockaddr *) sa, sizeof(*sa));
-
- if (passwd)
- {
- int len = strlen(passwd);
-
- if (len > TCP_MD5SIG_MAXKEYLEN)
- {
- log(L_ERR "MD5 password too long");
- return -1;
- }
-
- md5.tcpm_keylen = len;
- memcpy(&md5.tcpm_key, passwd, len);
- }
-
- int rv = setsockopt(s->fd, IPPROTO_TCP, TCP_MD5SIG, &md5, sizeof(md5));
-
- if (rv < 0)
- {
- if (errno == ENOPROTOOPT)
- log(L_ERR "Kernel does not support TCP MD5 signatures");
- else
- log(L_ERR "sk_set_md5_auth_int: setsockopt: %m");
- }
-
- return rv;
-}
-
/**
* sk_set_md5_auth - add / remove MD5 security association for given socket.
* @s: socket
diff --git a/sysdep/unix/krt.c b/sysdep/unix/krt.c
index 83456b0..6208f68 100644
--- a/sysdep/unix/krt.c
+++ b/sysdep/unix/krt.c
@@ -637,8 +637,8 @@ krt_got_route_async(struct krt_proto *p, rte *e, int new UNUSED)
DBG("It's a redirect, kill him! Kill! Kill!\n");
krt_set_notify(p, net, NULL, e);
break;
- case KRT_SRC_ALIEN:
#ifdef KRT_ALLOW_LEARN
+ case KRT_SRC_ALIEN:
if (KRT_CF->learn)
{
krt_learn_async(p, e, new);