aboutsummaryrefslogtreecommitdiffstats
path: root/src/charon/encoding/payloads/encryption_payload.c
diff options
context:
space:
mode:
authorMartin Willi <martin@strongswan.org>2006-06-15 11:09:11 +0000
committerMartin Willi <martin@strongswan.org>2006-06-15 11:09:11 +0000
commitc095388f7f04930171eca643f29db972ec7d9ed5 (patch)
tree07acc62917bfd4a95a3a7fca76afa6431587c974 /src/charon/encoding/payloads/encryption_payload.c
parent3efbf983124b6cd89087a3967bdfdfe0ccc607e3 (diff)
downloadstrongswan-c095388f7f04930171eca643f29db972ec7d9ed5.tar.bz2
strongswan-c095388f7f04930171eca643f29db972ec7d9ed5.tar.xz
added support for "ike" and "esp" keywords
fixed bugs in proposal code algorithm selection for charon works now with ipsec.conf a lot of other fixes
Diffstat (limited to 'src/charon/encoding/payloads/encryption_payload.c')
-rw-r--r--src/charon/encoding/payloads/encryption_payload.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/charon/encoding/payloads/encryption_payload.c b/src/charon/encoding/payloads/encryption_payload.c
index 358f371e9..20d733ea1 100644
--- a/src/charon/encoding/payloads/encryption_payload.c
+++ b/src/charon/encoding/payloads/encryption_payload.c
@@ -385,7 +385,7 @@ static status_t decrypt(private_encryption_payload_t *this)
*/
if (concatenated.len < iv.len)
{
- this->logger->log(this->logger, ERROR|LEVEL1, "could not decrypt, invalid input");
+ this->logger->log(this->logger, ERROR, "could not decrypt, invalid input");
return FAILED;
}
@@ -397,7 +397,7 @@ static status_t decrypt(private_encryption_payload_t *this)
status = this->crypter->decrypt(this->crypter, concatenated, iv, &(this->decrypted));
if (status != SUCCESS)
{
- this->logger->log(this->logger, ERROR|LEVEL1, "could not decrypt, decryption failed");
+ this->logger->log(this->logger, ERROR, "could not decrypt, decryption failed");
return FAILED;
}
this->logger->log_chunk(this->logger, RAW|LEVEL2, "data after decryption with padding", this->decrypted);
@@ -412,7 +412,7 @@ static status_t decrypt(private_encryption_payload_t *this)
/* check size again */
if (padding_length > concatenated.len || this->decrypted.len < 0)
{
- this->logger->log(this->logger, ERROR|LEVEL1, "decryption failed, invalid padding length found. Invalid key?");
+ this->logger->log(this->logger, ERROR, "decryption failed, invalid padding length found. Invalid key?");
/* decryption failed :-/ */
return FAILED;
}
@@ -575,7 +575,7 @@ static status_t parse(private_encryption_payload_t *this)
status = current_payload->verify(current_payload);
if (status != SUCCESS)
{
- this->logger->log(this->logger, ERROR|LEVEL1, "%s verification failed: %s",
+ this->logger->log(this->logger, ERROR, "%s verification failed: %s",
mapping_find(payload_type_m,current_payload->get_type(current_payload)),
mapping_find(status_m, status));
current_payload->destroy(current_payload);