Module: kamailio Branch: 5.2 Commit: edbe99332af576b8c860c9d887e3eb1c51c9b6db URL: https://github.com/kamailio/kamailio/commit/edbe99332af576b8c860c9d887e3eb1c51c9b6db
Author: Victor Seva <[email protected]> Committer: Henning Westerholt <[email protected]> Date: 2020-01-23T15:53:22+01:00 smsops: fix spelling error (cherry picked from commit 4a657005a5c4eff88e48dc2b8847d5800a90bead) --- Modified: src/modules/smsops/smsops_impl.c --- Diff: https://github.com/kamailio/kamailio/commit/edbe99332af576b8c860c9d887e3eb1c51c9b6db.diff Patch: https://github.com/kamailio/kamailio/commit/edbe99332af576b8c860c9d887e3eb1c51c9b6db.patch --- diff --git a/src/modules/smsops/smsops_impl.c b/src/modules/smsops/smsops_impl.c index b5eef0a593..d686c2ea78 100644 --- a/src/modules/smsops/smsops_impl.c +++ b/src/modules/smsops/smsops_impl.c @@ -543,7 +543,7 @@ int decode_3gpp_sms(struct sip_msg *msg) { // Check for malicious length, which might cause buffer overflow if(udh_len > body.len - p) { - LM_ERR("TP-User-Data-Lenght is bigger than the remaining message buffer!\n"); + LM_ERR("TP-User-Data-Length is bigger than the remaining message buffer!\n"); return -1; } @@ -564,7 +564,7 @@ int decode_3gpp_sms(struct sip_msg *msg) { // Check for malicious length, which might cause buffer overflow if(udh_read + ie->data.len + 2 /* two octets are read so far */ > udh_len) { - LM_ERR("IE Lenght for IE id %d is bigger than the remaining User-Data element!\n", + LM_ERR("IE Length for IE id %d is bigger than the remaining User-Data element!\n", ie->identifier); pkg_free(ie); return -1; _______________________________________________ Kamailio (SER) - Development Mailing List [email protected] https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-dev
