aboutsummaryrefslogtreecommitdiff
path: root/forward.c
diff options
context:
space:
mode:
authorjames <james@e7ae566f-a301-0410-adde-c780ea21d3b5>2005-10-31 03:01:17 +0000
committerjames <james@e7ae566f-a301-0410-adde-c780ea21d3b5>2005-10-31 03:01:17 +0000
commitc67d59cd5c30534a4108945294284f29df7a6c84 (patch)
tree00f4471a4eba2fdb39f1c0b4a0021d6824eb2abb /forward.c
parentChanges to Windows build configuration to (diff)
downloadopenvpn-c67d59cd5c30534a4108945294284f29df7a6c84.tar.xz
Windows reliability changes:
* Added code to make sure that the local PATH environmental variable points to the Windows system32 directory. * Added new --ip-win32 adaptive mode which tries 'dynamic' and then fails over to 'netsh' if the DHCP negotiation fails. * Made --ip-win32 adaptive the default. git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@739 e7ae566f-a301-0410-adde-c780ea21d3b5
Diffstat (limited to '')
-rw-r--r--forward.c10
1 files changed, 7 insertions, 3 deletions
diff --git a/forward.c b/forward.c
index ae2122f..338d862 100644
--- a/forward.c
+++ b/forward.c
@@ -274,8 +274,12 @@ check_add_routes_dowork (struct context *c)
else
{
msg (D_ROUTE, "Route: Waiting for TUN/TAP interface to come up...");
+ if (c->c1.tuntap)
+ tun_standby (c->c1.tuntap);
+ update_time ();
if (c->c2.route_wakeup.n != 1)
event_timeout_init (&c->c2.route_wakeup, 1, now);
+ event_timeout_reset (&c->c2.ping_rec_interval);
}
}
@@ -773,7 +777,7 @@ process_incoming_link (struct context *c)
#endif
#ifdef PACKET_TRUNCATION_CHECK
- /* if (c->c2.buf.len > 1) --c->c2.buf.len; JYFIXME */
+ /* if (c->c2.buf.len > 1) --c->c2.buf.len; */
ipv4_packet_size_verify (BPTR (&c->c2.buf),
BLEN (&c->c2.buf),
TUNNEL_TYPE (c->c1.tuntap),
@@ -807,7 +811,7 @@ process_incoming_link (struct context *c)
/* Did we just receive an openvpn ping packet? */
if (is_ping_msg (&c->c2.buf))
{
- dmsg (D_PACKET_CONTENT, "RECEIVED PING PACKET");
+ dmsg (D_PING, "RECEIVED PING PACKET");
c->c2.buf.len = 0; /* drop packet */
}
@@ -911,7 +915,7 @@ process_incoming_tun (struct context *c)
process_ipv4_header (c, PIPV4_PASSTOS|PIPV4_MSSFIX, &c->c2.buf);
#ifdef PACKET_TRUNCATION_CHECK
- /* if (c->c2.buf.len > 1) --c->c2.buf.len; JYFIXME */
+ /* if (c->c2.buf.len > 1) --c->c2.buf.len; */
ipv4_packet_size_verify (BPTR (&c->c2.buf),
BLEN (&c->c2.buf),
TUNNEL_TYPE (c->c1.tuntap),