~IPIntercept() {};
/** Perform NAT lookups */
- int NatLookup(int fd, const IPAddress &me, const IPAddress &peer, IPAddress &dst);
+ int NatLookup(int fd, const IPAddress &me, const IPAddress &peer, IPAddress &client, IPAddress &dst);
#if LINUX_TPROXY2
// only relevant to TPROXY v2 connections.
\retval 0 Successfuly located the new address.
\retval -1 An error occured during NAT lookups.
*/
- int NetfilterInterception(int fd, const IPAddress &me, IPAddress &dst, int silent);
+ int NetfilterInterception(int fd, const IPAddress &me, IPAddress &client, int silent);
/**
* perform Lookups on Netfilter fully-transparent interception targets (TPROXY).
\retval 0 Successfuly located the new address.
\retval -1 An error occured during NAT lookups.
*/
- int IPFWInterception(int fd, const IPAddress &me, IPAddress &dst, int silent);
+ int IPFWInterception(int fd, const IPAddress &me, IPAddress &client, int silent);
int transparent_active;
int tos = 0;
if (Config.zph_tos_peer &&
(http->request->hier.code==SIBLING_HIT ||
- Config.onoff.zph_tos_parent && http->request->hier.code==PARENT_HIT) )
+ (Config.onoff.zph_tos_parent && http->request->hier.code==PARENT_HIT) ) )
{
tos = Config.zph_tos_peer;
debugs(33, 2, "ZPH: Peer hit with hier.code="<<http->request->hier.code<<", TOS="<<tos);