Module: kamailio
Branch: 5.3
Commit: 4537518a1df4c579f0603dfdbe947f3cee6d0fe3
URL: https://github.com/kamailio/kamailio/commit/4537518a1df4c579f0603dfdbe947f3…
Author: Victor Seva <linuxmaniac(a)torreviejawireless.org>
Committer: Victor Seva <linuxmaniac(a)torreviejawireless.org>
Date: 2019-10-22T10:27:18+02:00
smsops: fix spelling error
(cherry picked from commit 4a657005a5c4eff88e48dc2b8847d5800a90bead)
---
Modified: src/modules/smsops/smsops_impl.c
---
Diff: https://github.com/kamailio/kamailio/commit/4537518a1df4c579f0603dfdbe947f3…
Patch: https://github.com/kamailio/kamailio/commit/4537518a1df4c579f0603dfdbe947f3…
---
diff --git a/src/modules/smsops/smsops_impl.c b/src/modules/smsops/smsops_impl.c
index 8dfe70163a..83d83a7a8e 100644
--- a/src/modules/smsops/smsops_impl.c
+++ b/src/modules/smsops/smsops_impl.c
@@ -543,7 +543,7 @@ int decode_3gpp_sms(struct sip_msg *msg) {
// Check for malicious length, which might cause buffer overflow
if(udh_len > body.len - p) {
- LM_ERR("TP-User-Data-Lenght is bigger than the remaining message buffer!\n");
+ LM_ERR("TP-User-Data-Length is bigger than the remaining message buffer!\n");
return -1;
}
@@ -564,7 +564,7 @@ int decode_3gpp_sms(struct sip_msg *msg) {
// Check for malicious length, which might cause buffer overflow
if(udh_read + ie->data.len + 2 /* two octets are read so far */ > udh_len) {
- LM_ERR("IE Lenght for IE id %d is bigger than the remaining User-Data element!\n",
+ LM_ERR("IE Length for IE id %d is bigger than the remaining User-Data element!\n",
ie->identifier);
pkg_free(ie);
return -1;