diff options
author | Jason A. Donenfeld <Jason@zx2c4.com> | 2016-11-05 02:51:05 +0100 |
---|---|---|
committer | Jason A. Donenfeld <Jason@zx2c4.com> | 2016-11-05 02:51:05 +0100 |
commit | 028c66a45b5017ca5cba0f4ed1e222888d816d8c (patch) | |
tree | 62b4df6b00b70e7513294c782887b6626887143a /src/send.c | |
parent | socket: route() returns an error pointer, not NULL on failure (diff) | |
download | wireguard-monolithic-historical-028c66a45b5017ca5cba0f4ed1e222888d816d8c.tar.xz wireguard-monolithic-historical-028c66a45b5017ca5cba0f4ed1e222888d816d8c.zip |
socket: big refactoring
Diffstat (limited to 'src/send.c')
-rw-r--r-- | src/send.c | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -82,7 +82,7 @@ void packet_send_handshake_cookie(struct wireguard_device *wg, struct sk_buff *i net_dbg_ratelimited("Sending cookie response for denied handshake message for %pISpfsc\n", &addr); #endif cookie_message_create(&packet, initiating_skb, data, data_len, sender_index, &wg->cookie_checker); - socket_send_buffer_as_reply_to_skb(initiating_skb, &packet, sizeof(packet), wg); + socket_send_buffer_as_reply_to_skb(wg, initiating_skb, &packet, sizeof(packet)); } static inline void keep_key_fresh(struct wireguard_peer *peer) |