diff options
author | Martin Willi <martin@revosec.ch> | 2011-02-07 16:38:54 +0100 |
---|---|---|
committer | Martin Willi <martin@revosec.ch> | 2011-02-07 16:39:33 +0100 |
commit | 94030a670bf8b0fa35c29d01d1348fc2a2ed8c02 (patch) | |
tree | 0acabf8899736064db9cbf80d13ef2acf1954d2b | |
parent | b1d8fb01d66f1b07992b5975d755422179b50b02 (diff) | |
download | strongswan-94030a670bf8b0fa35c29d01d1348fc2a2ed8c02.tar.bz2 strongswan-94030a670bf8b0fa35c29d01d1348fc2a2ed8c02.tar.xz |
Report correct key size if a cipher is not supported
-rw-r--r-- | src/libcharon/sa/keymat.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/libcharon/sa/keymat.c b/src/libcharon/sa/keymat.c index f9f24787a..33ece24b2 100644 --- a/src/libcharon/sa/keymat.c +++ b/src/libcharon/sa/keymat.c @@ -214,7 +214,7 @@ static bool derive_ike_traditional(private_keymat_t *this, u_int16_t enc_alg, { DBG1(DBG_IKE, "%N %N (key size %d) not supported!", transform_type_names, ENCRYPTION_ALGORITHM, - encryption_algorithm_names, enc_alg, key_size); + encryption_algorithm_names, enc_alg, enc_size); signer_i->destroy(signer_i); signer_r->destroy(signer_r); return FALSE; |