diff options
author | Martin Willi <martin@revosec.ch> | 2010-08-26 12:18:24 +0200 |
---|---|---|
committer | Martin Willi <martin@revosec.ch> | 2010-08-31 15:35:29 +0200 |
commit | d169aab35e4b4d76ddb3f500af3f711e5933f160 (patch) | |
tree | 91d39c7f4ce432a1a5e88f24d82758a9c3088036 /src/libtls/tls_fragmentation.c | |
parent | fd0bde9a604346af4dcc1531f78c4f67a20cd016 (diff) | |
download | strongswan-d169aab35e4b4d76ddb3f500af3f711e5933f160.tar.bz2 strongswan-d169aab35e4b4d76ddb3f500af3f711e5933f160.tar.xz |
Log TLS handshake subtypes as handshakes
Diffstat (limited to 'src/libtls/tls_fragmentation.c')
-rw-r--r-- | src/libtls/tls_fragmentation.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/libtls/tls_fragmentation.c b/src/libtls/tls_fragmentation.c index 6fe3dd65b..e7f42ec2a 100644 --- a/src/libtls/tls_fragmentation.c +++ b/src/libtls/tls_fragmentation.c @@ -154,7 +154,7 @@ static status_t process_handshake(private_tls_fragmentation_t *this, this->type = type; if (len > MAX_TLS_HANDSHAKE_LEN) { - DBG1(DBG_TLS, "TLS handshake message exceeds maximum length"); + DBG1(DBG_TLS, "TLS handshake exceeds maximum length"); this->alert->add(this->alert, TLS_FATAL, TLS_DECODE_ERROR); return NEED_MORE; } @@ -179,8 +179,8 @@ static status_t process_handshake(private_tls_fragmentation_t *this, if (this->input.len == this->inpos) { /* message completely defragmented, process */ msg = tls_reader_create(this->input); - DBG2(DBG_TLS, "received TLS %N message (%u bytes)", - tls_handshake_type_names, this->type, 4 + this->input.len); + DBG2(DBG_TLS, "received TLS %N hanshake (%u bytes)", + tls_handshake_type_names, this->type, this->input.len); status = this->handshake->process(this->handshake, this->type, msg); msg->destroy(msg); chunk_free(&this->input); @@ -312,8 +312,8 @@ static status_t build_handshake(private_tls_fragmentation_t *this) case NEED_MORE: msg->write_uint8(msg, type); msg->write_data24(msg, hs->get_buf(hs)); - DBG2(DBG_TLS, "sending TLS %N message (%u bytes)", - tls_handshake_type_names, type, 4 + hs->get_buf(hs).len); + DBG2(DBG_TLS, "sending TLS %N handshake (%u bytes)", + tls_handshake_type_names, type, hs->get_buf(hs).len); hs->destroy(hs); continue; case INVALID_STATE: |