if (f >= 0)
{
- if (read(f, randombuf, ilength) < ilength)
+ if (read(f, randombuf, ilength) < (int)ilength)
ServerInstance->Logs->Log("m_spanningtree", DEFAULT, "Entropy source has gone predictable (did not return enough data)");
close(f);
}
this->auth_challenge = !ourchallenge.empty() && !theirchallenge.empty();
std::string fp;
- if (GetHook())
+ if (GetIOHook())
{
- BufferedSocketCertificateRequest req(this, Utils->Creator, GetHook());
+ BufferedSocketCertificateRequest req(this, Utils->Creator, GetIOHook());
req.Send();
if (req.cert)
{
{
/* Require fingerprint to exist and match */
if (link.Fingerprint != fp)
+ {
+ ServerInstance->SNO->WriteToSnoMask('l',"Invalid SSL fingerprint on link %s: need '%s' got '%s'",
+ link.Name.c_str(), link.Fingerprint.c_str(), fp.c_str());
return false;
+ }
}
if (auth_challenge)