aboutsummaryrefslogtreecommitdiffstats
path: root/lib/hipe/ssa
diff options
context:
space:
mode:
authorAnders Svensson <[email protected]>2013-04-05 11:04:07 +0200
committerAnders Svensson <[email protected]>2013-05-17 15:15:54 +0200
commit4ce2d3a67488811be96853f9b83ef8da2712b5e7 (patch)
tree29889f2680b03c30c9122a4f69a9ee34d163d856 /lib/hipe/ssa
parentcf37640e614ca0d9172b2b630eeb0672967cb9e3 (diff)
downloadotp-4ce2d3a67488811be96853f9b83ef8da2712b5e7.tar.gz
otp-4ce2d3a67488811be96853f9b83ef8da2712b5e7.tar.bz2
otp-4ce2d3a67488811be96853f9b83ef8da2712b5e7.zip
Fix recognition of 5014 (INVALID_AVP_LENGTH) errors
Invalid lengths come in two flavours: ones that correctly point at the end of an AVP's payload but don't agree with its type, and ones that point elsewhere. The former are relatively harmless but the latter leave no way to recover AVP boundaries, which typically results in failure to decode subsequent AVP's in the message in question. In the case that AVP Length points past the end of the message, diameter incorrectly regarded the error as 5009, INVALID_AVP_BITS: not right since the error has nothing to do with AVP Flags. Ditto if the length was less than 8, a minimal header length. Only in the remaining case was the detected error 5014, INVALID_AVP_LENGTH. However, in this case it slavishly followed RFC 3588 in suggesting the undecodable AVP as Failed-AVP, thereby passing the woeful payload back to the sender to have equal difficulty decoding. Now follow RFC 6733 and suggest an AVP with a zero-filled payload.
Diffstat (limited to 'lib/hipe/ssa')
0 files changed, 0 insertions, 0 deletions