- if (ksl_decrypt(&p->ks, ty, bin, bout)) {
- p->st.n_reject++;
- a_warn("PEER", "?PEER", p, "decrypt-failed", A_END);
+ peer *p;
+ peer_byaddr *pa;
+ int err = KSERR_DECRYPT;
+ unsigned f;
+
+ if (*pp) {
+ p = *pp;
+ T( trace(T_PEER, "peer: decrypting packet from known peer `%s'",
+ p_name(p)); )
+ err = ksl_decrypt(&p->ks, ty, bin, bout);
+ } else {
+ p = 0;
+ if (nmobile) {
+ T( trace(T_PEER, "peer: unknown source: trying mobile peers..."); )
+ FOREACH_PEER(q, {
+ if ((err = ksl_decrypt(&q->ks, ty, bin, bout)) == KSERR_DECRYPT) {
+ T( trace(T_PEER, "peer: peer `%s' failed to decrypt",
+ p_name(q)); )
+ continue;
+ } else {
+ p = *pp = q;
+ IF_TRACING(T_PEER, {
+ if (!err)
+ trace(T_PEER, "peer: peer `%s' reports success", p_name(p));
+ else {
+ trace(T_PEER, "peer: peer `%s' reports decryption error %d",
+ p_name(p), err);
+ }
+ })
+ break;
+ }
+ });
+ }
+ if (!p) {
+ a_warn("PEER", "-", "unexpected-source", "?ADDR", a, A_END);
+ return (-1);
+ }
+ if (!err) {
+ T( trace(T_PEER, "peer: updating address for `%s'", p_name(p)); )
+ p_rxupdstats(p, n);
+ pa = am_find(&byaddr, a, sizeof(peer_byaddr), &f); assert(!f);
+ am_remove(&byaddr, p->byaddr);
+ p->byaddr = pa;
+ pa->p = p;
+ p->spec.sa = *a;
+ a_notify("NEWADDR", "?PEER", p, "?ADDR", a, A_END);
+ }
+ }
+ if (err) {
+ if (p) p->st.n_reject++;
+ a_warn("PEER", "?PEER", p, "decrypt-failed",
+ "error-code", "%d", err, A_END);