static bool checklength(node_t *source, vpn_packet_t *packet, uint16_t length) {
if(packet->len < length) {
- logger(source->mesh, MESHLINK_WARNING, "Got too short packet from %s (%s)", source->name, source->hostname);
+ logger(source->mesh, MESHLINK_WARNING, "Got too short packet from %s", source->name);
return false;
} else
return true;
const void *payload = packet->data + sizeof(*hdr);
size_t len = packet->len - sizeof(*hdr);
- char hex[len*2 + 1];
+ char hex[len * 2 + 1];
if(mesh->log_level >= MESHLINK_DEBUG)
bin2hex(payload, hex, len); // don't do this unless it's going to be logged
logger(mesh, MESHLINK_DEBUG, "I received a packet for me with payload: %s\n", hex);
via = (owner->via == mesh->self) ? owner->nexthop : owner->via;
if(via == source) {
- logger(mesh, MESHLINK_ERROR, "Routing loop for packet from %s (%s)!", source->name, source->hostname);
+ logger(mesh, MESHLINK_ERROR, "Routing loop for packet from %s!", source->name);
return;
}