summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorVladislav Grishenko <themiron@mail.ru>2020-06-28 20:11:54 +0500
committerVladislav Grishenko <themiron@mail.ru>2020-06-28 20:13:43 +0500
commit38af8fca2c87d4e1afff4cb612de871941a36301 (patch)
treede74ce0dc2e087d23bb7cb33dc7ddade3dbf5376
parentddb7c9e79b27e91a365f13f1895f89c17722462c (diff)
downloadaccel-ppp-xebd-38af8fca2c87d4e1afff4cb612de871941a36301.tar.gz
accel-ppp-xebd-38af8fca2c87d4e1afff4cb612de871941a36301.zip
sstp: fix crypto-binding attr errors logging
-rw-r--r--accel-pppd/ctrl/sstp/sstp.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/accel-pppd/ctrl/sstp/sstp.c b/accel-pppd/ctrl/sstp/sstp.c
index 7574a78..41e9aec 100644
--- a/accel-pppd/ctrl/sstp/sstp.c
+++ b/accel-pppd/ctrl/sstp/sstp.c
@@ -1528,7 +1528,7 @@ static int sstp_recv_msg_call_connected(struct sstp_conn_t *conn, struct sstp_ct
}
if (conn->nonce && memcmp(msg->attr.nonce, conn->nonce, SSTP_NONCE_SIZE) != 0) {
- log_ppp_error("sstp: invalid Nonce");
+ log_ppp_error("sstp: invalid Nonce\n");
return sstp_abort(conn, 0);
}
@@ -1537,7 +1537,7 @@ static int sstp_recv_msg_call_connected(struct sstp_conn_t *conn, struct sstp_ct
len = SHA256_DIGEST_LENGTH;
if (conf_hash_sha256.len == len &&
memcmp(msg->attr.cert_hash, conf_hash_sha256.hash, len) != 0) {
- log_ppp_error("sstp: invalid SHA256 Cert Hash");
+ log_ppp_error("sstp: invalid SHA256 Cert Hash\n");
return sstp_abort(conn, 0);
}
#ifdef CRYPTO_OPENSSL
@@ -1547,7 +1547,7 @@ static int sstp_recv_msg_call_connected(struct sstp_conn_t *conn, struct sstp_ct
len = SHA_DIGEST_LENGTH;
if (conf_hash_sha1.len == len &&
memcmp(msg->attr.cert_hash, conf_hash_sha1.hash, len) != 0) {
- log_ppp_error("sstp: invalid SHA1 Cert Hash");
+ log_ppp_error("sstp: invalid SHA1 Cert Hash\n");
return sstp_abort(conn, 0);
}
#ifdef CRYPTO_OPENSSL
@@ -1573,7 +1573,7 @@ static int sstp_recv_msg_call_connected(struct sstp_conn_t *conn, struct sstp_ct
HMAC(evp, md, mdlen, (void *)&buf, sizeof(buf), buf.attr.compound_mac, &len);
if (memcmp(msg->attr.compound_mac, buf.attr.compound_mac, len) != 0) {
- log_ppp_error("sstp: invalid Compound MAC");
+ log_ppp_error("sstp: invalid Compound MAC\n");
return sstp_abort(conn, 0);
}
}