/* --- Discard a packet with an invalid cookie --- */
if (hc && memcmp(hc, kx->hc, algs.hashsz) != 0) {
- a_warn("KX", "?PEER", "incorrect", "cookie", A_END);
+ a_warn("KX", "?PEER", kx->p, "incorrect", "cookie", A_END);
goto bad;
}
checkresponse(kx, KX_SWITCH, b))
goto bad;
if ((hswrq = buf_get(b, algs.hashsz)) == 0 || BLEFT(b)) {
- a_warn("KX", "?PEER", "invalid", "switch-rq", A_END);
+ a_warn("KX", "?PEER", kx->p, "invalid", "switch-rq", A_END);
goto bad;
}
IF_TRACING(T_KEYEXCH, {
if (decryptrest(kx, kxc, KX_SWITCHOK, b))
goto bad;
if ((hswok = buf_get(b, algs.hashsz)) == 0 || BLEFT(b)) {
- a_warn("KX", "?PEER", "invalid", "switch-ok", A_END);
+ a_warn("KX", "?PEER", kx->p, "invalid", "switch-ok", A_END);
goto bad;
}
IF_TRACING(T_KEYEXCH, {