Module: kamailio Branch: 5.2 Commit: edbe99332af576b8c860c9d887e3eb1c51c9b6db URL: https://github.com/kamailio/kamailio/commit/edbe99332af576b8c860c9d887e3eb1c...
Author: Victor Seva linuxmaniac@torreviejawireless.org Committer: Henning Westerholt hw@skalatan.de Date: 2020-01-23T15:53:22+01:00
smsops: fix spelling error
(cherry picked from commit 4a657005a5c4eff88e48dc2b8847d5800a90bead)
---
Modified: src/modules/smsops/smsops_impl.c
---
Diff: https://github.com/kamailio/kamailio/commit/edbe99332af576b8c860c9d887e3eb1c... Patch: https://github.com/kamailio/kamailio/commit/edbe99332af576b8c860c9d887e3eb1c...
---
diff --git a/src/modules/smsops/smsops_impl.c b/src/modules/smsops/smsops_impl.c index b5eef0a593..d686c2ea78 100644 --- a/src/modules/smsops/smsops_impl.c +++ b/src/modules/smsops/smsops_impl.c @@ -543,7 +543,7 @@ int decode_3gpp_sms(struct sip_msg *msg) {
// Check for malicious length, which might cause buffer overflow if(udh_len > body.len - p) { - LM_ERR("TP-User-Data-Lenght is bigger than the remaining message buffer!\n"); + LM_ERR("TP-User-Data-Length is bigger than the remaining message buffer!\n"); return -1; }
@@ -564,7 +564,7 @@ int decode_3gpp_sms(struct sip_msg *msg) {
// Check for malicious length, which might cause buffer overflow if(udh_read + ie->data.len + 2 /* two octets are read so far */ > udh_len) { - LM_ERR("IE Lenght for IE id %d is bigger than the remaining User-Data element!\n", + LM_ERR("IE Length for IE id %d is bigger than the remaining User-Data element!\n", ie->identifier); pkg_free(ie); return -1;