more DoS prevention: add packet_limit option to apply a hard limit to downstream...
[l2tpns.git] / throttlectl.c
index 0051087..7990151 100644 (file)
@@ -5,7 +5,7 @@
 
 /* throttle control */
 
-char const *cvs_id = "$Id: throttlectl.c,v 1.3 2004/11/18 06:41:03 bodea Exp $";
+char const *cvs_id = "$Id: throttlectl.c,v 1.6 2004/12/01 04:44:29 bodea Exp $";
 
 int plugin_api_version = PLUGIN_API_VERSION;
 static struct pluginfuncs *p = 0;
@@ -44,11 +44,11 @@ int plugin_control(struct param_control *data)
        if (!data->iam_master)
                return PLUGIN_RET_NOTMASTER;
 
-       flag = data->argv[0][0] != 'g';
+       flag = data->argv[0][0] == 't';
 
        if (flag)
        {
-               if (data->argc < 2 || data->argc > 4)
+               if (data->argc < 2 || data->argc > 6)
                {
                        data->response = NSCTL_RES_ERR;
                        data->additional = "requires username or session id and optional rate(s)";