git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@624 e7ae566f-a301-0410-adde-c780ea21d3b5
| ... | ... |
@@ -772,7 +772,7 @@ process_incoming_link (struct context *c) |
| 772 | 772 |
#endif |
| 773 | 773 |
|
| 774 | 774 |
#ifdef PACKET_TRUNCATION_CHECK |
| 775 |
- //if (c->c2.buf.len > 1) --c->c2.buf.len; // JYFIXME |
|
| 775 |
+ /* if (c->c2.buf.len > 1) --c->c2.buf.len; JYFIXME */ |
|
| 776 | 776 |
ipv4_packet_size_verify (BPTR (&c->c2.buf), |
| 777 | 777 |
BLEN (&c->c2.buf), |
| 778 | 778 |
TUNNEL_TYPE (c->c1.tuntap), |
| ... | ... |
@@ -913,7 +913,7 @@ process_incoming_tun (struct context *c) |
| 913 | 913 |
process_ipv4_header (c, PIPV4_PASSTOS|PIPV4_MSSFIX, &c->c2.buf); |
| 914 | 914 |
|
| 915 | 915 |
#ifdef PACKET_TRUNCATION_CHECK |
| 916 |
- //if (c->c2.buf.len > 1) --c->c2.buf.len; // JYFIXME |
|
| 916 |
+ /* if (c->c2.buf.len > 1) --c->c2.buf.len; JYFIXME */ |
|
| 917 | 917 |
ipv4_packet_size_verify (BPTR (&c->c2.buf), |
| 918 | 918 |
BLEN (&c->c2.buf), |
| 919 | 919 |
TUNNEL_TYPE (c->c1.tuntap), |
| ... | ... |
@@ -119,8 +119,8 @@ static |
| 119 | 119 |
void |
| 120 | 120 |
_fixupFixedString ( |
| 121 | 121 |
IN const char * const szSource, |
| 122 |
- OUT char * const szTarget, // MUST BE >= nLength+1 |
|
| 123 |
- IN const int nLength // FIXED STRING LENGTH |
|
| 122 |
+ OUT char * const szTarget, /* MUST BE >= nLength+1 */ |
|
| 123 |
+ IN const int nLength /* FIXED STRING LENGTH */ |
|
| 124 | 124 |
); |
| 125 | 125 |
static |
| 126 | 126 |
void |
| ... | ... |
@@ -273,8 +273,8 @@ static |
| 273 | 273 |
void |
| 274 | 274 |
_fixupFixedString ( |
| 275 | 275 |
IN const char * const szSource, |
| 276 |
- OUT char * const szTarget, // MUST BE >= nLength+1 |
|
| 277 |
- IN const int nLength // FIXED STRING LENGTH |
|
| 276 |
+ OUT char * const szTarget, /* MUST BE >= nLength+1 */ |
|
| 277 |
+ IN const int nLength /* FIXED STRING LENGTH */ |
|
| 278 | 278 |
) {
|
| 279 | 279 |
char *p; |
| 280 | 280 |
|
| ... | ... |
@@ -1865,7 +1865,7 @@ SSL_CTX_use_pkcs11 ( |
| 1865 | 1865 |
RSA_set_method (rsa, openssl_pkcs11_get_rsa_method (rsa)); |
| 1866 | 1866 |
rsa->flags |= RSA_FLAG_SIGN_VER; |
| 1867 | 1867 |
|
| 1868 |
- // it will be freed when rsa usage count will be zero |
|
| 1868 |
+ /* it will be freed when rsa usage count will be zero */ |
|
| 1869 | 1869 |
fShouldFreeOpenSSLSession = false; |
| 1870 | 1870 |
} |
| 1871 | 1871 |
|
| ... | ... |
@@ -620,7 +620,7 @@ socket_listen_accept (socket_descriptor_t sd, |
| 620 | 620 |
volatile int *signal_received) |
| 621 | 621 |
{
|
| 622 | 622 |
struct gc_arena gc = gc_new (); |
| 623 |
- //struct openvpn_sockaddr *remote = &act->dest; |
|
| 623 |
+ /* struct openvpn_sockaddr *remote = &act->dest; */ |
|
| 624 | 624 |
struct openvpn_sockaddr remote_verify = act->dest; |
| 625 | 625 |
int new_sd = SOCKET_UNDEFINED; |
| 626 | 626 |
|
| ... | ... |
@@ -80,14 +80,14 @@ typedef uint16_t packet_size_type; |
| 80 | 80 |
/* OpenVPN sockaddr struct */ |
| 81 | 81 |
struct openvpn_sockaddr |
| 82 | 82 |
{
|
| 83 |
- int dummy; // JYFIXME |
|
| 83 |
+ int dummy; /* JYFIXME */ |
|
| 84 | 84 |
struct sockaddr_in sa; |
| 85 | 85 |
}; |
| 86 | 86 |
|
| 87 | 87 |
/* actual address of remote, based on source address of received packets */ |
| 88 | 88 |
struct link_socket_actual |
| 89 | 89 |
{
|
| 90 |
- int dummy; // JYFIXME |
|
| 90 |
+ int dummy; /* JYFIXME */ |
|
| 91 | 91 |
struct openvpn_sockaddr dest; |
| 92 | 92 |
#if ENABLE_IP_PKTINFO |
| 93 | 93 |
struct in_pktinfo pi; |