From ac078bccf2bec2220233bb7ff40560da2131c10d Mon Sep 17 00:00:00 2001 From: erdgeist <> Date: Sat, 15 Dec 2007 17:39:38 +0000 Subject: [PATCH] too many wrong udp requests scroll too much :) disable logging for now --- ot_udp.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/ot_udp.c b/ot_udp.c index ad389e3..786855b 100644 --- a/ot_udp.c +++ b/ot_udp.c @@ -57,7 +57,7 @@ void handle_udp4( int64 serversocket ) { if( r < 16 ) return; - fprintf( stderr, "UDP Connection id: %16llX\n", *(uint64_t*)inpacket ); +/* fprintf( stderr, "UDP Connection id: %16llX\n", *(uint64_t*)inpacket ); */ switch( ntohl( inpacket[2] ) ) { case 0: /* This is a connect action */ @@ -77,8 +77,8 @@ void handle_udp4( int64 serversocket ) { if( r < 98 ) return; - if( !udp_test_connectionid( inpacket, remoteip )) - fprintf( stderr, "UDP Connection id missmatch.\n" ); +/* if( !udp_test_connectionid( inpacket, remoteip )) + fprintf( stderr, "UDP Connection id missmatch.\n" ); */ numwant = 200; /* We do only want to know, if it is zero */ @@ -119,8 +119,8 @@ void handle_udp4( int64 serversocket ) { break; case 2: /* This is a scrape action */ - if( !udp_test_connectionid( inpacket, remoteip )) - fprintf( stderr, "UDP Connection id missmatch.\n" ); +/* if( !udp_test_connectionid( inpacket, remoteip )) + fprintf( stderr, "UDP Connection id missmatch.\n" ); */ outpacket[0] = htonl( 2 ); /* scrape action */ outpacket[1] = inpacket[12/4];