diff options
author | Anders Svensson <[email protected]> | 2013-04-05 11:04:07 +0200 |
---|---|---|
committer | Anders Svensson <[email protected]> | 2013-05-17 15:15:54 +0200 |
commit | 4ce2d3a67488811be96853f9b83ef8da2712b5e7 (patch) | |
tree | 29889f2680b03c30c9122a4f69a9ee34d163d856 /lib/edoc | |
parent | cf37640e614ca0d9172b2b630eeb0672967cb9e3 (diff) | |
download | otp-4ce2d3a67488811be96853f9b83ef8da2712b5e7.tar.gz otp-4ce2d3a67488811be96853f9b83ef8da2712b5e7.tar.bz2 otp-4ce2d3a67488811be96853f9b83ef8da2712b5e7.zip |
Fix recognition of 5014 (INVALID_AVP_LENGTH) errors
Invalid lengths come in two flavours: ones that correctly point at the
end of an AVP's payload but don't agree with its type, and ones that
point elsewhere. The former are relatively harmless but the latter leave
no way to recover AVP boundaries, which typically results in failure to
decode subsequent AVP's in the message in question.
In the case that AVP Length points past the end of the message, diameter
incorrectly regarded the error as 5009, INVALID_AVP_BITS: not right
since the error has nothing to do with AVP Flags. Ditto if the length
was less than 8, a minimal header length. Only in the remaining case was
the detected error 5014, INVALID_AVP_LENGTH. However, in this case it
slavishly followed RFC 3588 in suggesting the undecodable AVP as
Failed-AVP, thereby passing the woeful payload back to the sender to
have equal difficulty decoding. Now follow RFC 6733 and suggest an AVP
with a zero-filled payload.
Diffstat (limited to 'lib/edoc')
0 files changed, 0 insertions, 0 deletions