*/
s = body;
if (strncmp_const_skip(s, "SERVICE ", s, ch) == 0) {
+ ch=ch;
serviceX = stralloc(s);
serviceY = strtok(serviceX, "\n");
if (serviceY)
* If no accept handler was setup, then just return.
*/
if (udp->accept_fn == NULL) {
- dbprintf(_("Receive packet from unknown source"));
+ g_debug(_("Receive packet from unknown source"));
return;
}
* We remove it first because we don't want to get in their
* way if they reschedule it.
*/
- tcpm_stream_read_cancel(rs);
if (rs->rc->pktlen <= 0) {
auth_debug(1, _("sec: stream_read_callback: %s\n"), rs->rc->errmsg);
+ tcpm_stream_read_cancel(rs);
security_stream_seterror(&rs->secstr, "%s", rs->rc->errmsg);
if(rs->closed_by_me == 0 && rs->closed_by_network == 0)
sec_tcp_conn_put(rs->rc);
assert(cookie != NULL);
- auth_debug(1, _("sec: conn_read_callback\n"));
+ auth_debug(1, _("sec: conn_read_callback %d %d\n"), (int)rc->event_id, rc->read);
/* Read the data off the wire. If we get errors, shut down. */
rval = tcpm_recv_token(rc, rc->read, &rc->handle, &rc->errmsg, &rc->pkt,
revent);
/* delete our 'accept' reference */
if (rc->accept_fn != NULL) {
+ (*rc->accept_fn)(NULL, NULL);
if(rc->refcnt != 1) {
dbprintf(_("STRANGE, rc->refcnt should be 1, it is %d\n"),
rc->refcnt);
return server_hostname;
}
amfree(server_hostname);
- return "localhost";
+ return strdup("localhost");
}
char *
char *hostname = ((struct sec_handle *)hdl)->hostname;
if (!hostname)
hostname = "";
- return hostname;
+ return strdup(hostname);
}