device.log = logger
device.peers = make(map[NoisePublicKey]*Peer)
device.tun.device = tun
+ device.tun.isUp.Set(false)
device.indices.Init()
device.ratelimiter.Init()
}\r
}\r
\r
-/* Called when a new authenticated message has been recevied\r
+/* Called when a new authenticated message has been received\r
*\r
* NOTE: Not thread safe (called by sequential receiver)\r
*/\r
}\r
}\r
\r
-/* Called after succesfully completing a handshake.\r
+/* Called after successfully completing a handshake.\r
* i.e. after:\r
*\r
* - Valid handshake response\r
/* Event:\r
* An ephemeral key is generated\r
*\r
- * i.e after:\r
+ * i.e. after:\r
*\r
* CreateMessageInitiation\r
* CreateMessageResponse\r
logInfo := device.log.Info\r
logError := device.log.Error\r
logDebug := device.log.Debug\r
- logDebug.Println("Routine, handshake initator, started for", peer.String())\r
+ logDebug.Println("Routine, handshake initiator, started for", peer.String())\r
\r
var temp [256]byte\r
\r
}
func (tun *NativeTun) RoutineHackListener() {
- /* This is needed for the detection to work accross network namespaces
+ /* This is needed for the detection to work across network namespaces
* If you are reading this and know a better method, please get in touch.
*/
fd := int(tun.fd.Fd())