|
|
@@ -439,14 +439,14 @@ static int clnet_allocate(int verbose,
|
|
|
} else if (stun_is_challenge_response_str(message.buf, (size_t)message.len,
|
|
|
&err_code,err_msg,sizeof(err_msg),
|
|
|
clnet_info->realm,clnet_info->nonce)) {
|
|
|
- if(err_code == SHA_TOO_WEAK && (clnet_info->shatype == SHATYPE_SHA1)) {
|
|
|
+ if(err_code == SHA_TOO_WEAK_ERROR_CODE && (clnet_info->shatype == SHATYPE_SHA1)) {
|
|
|
clnet_info->shatype = SHATYPE_SHA256;
|
|
|
recalculate_restapi_hmac();
|
|
|
}
|
|
|
goto beg_allocate;
|
|
|
} else if (stun_is_error_response(&message, &err_code,err_msg,sizeof(err_msg))) {
|
|
|
|
|
|
- if(err_code == SHA_TOO_WEAK && (clnet_info->shatype == SHATYPE_SHA1) && use_short_term) {
|
|
|
+ if(err_code == SHA_TOO_WEAK_ERROR_CODE && (clnet_info->shatype == SHATYPE_SHA1) && use_short_term) {
|
|
|
clnet_info->shatype = SHATYPE_SHA256;
|
|
|
goto beg_allocate;
|
|
|
}
|
|
|
@@ -627,7 +627,7 @@ static int clnet_allocate(int verbose,
|
|
|
} else if (stun_is_challenge_response_str(message.buf, (size_t)message.len,
|
|
|
&err_code,err_msg,sizeof(err_msg),
|
|
|
clnet_info->realm,clnet_info->nonce)) {
|
|
|
- if(err_code == SHA_TOO_WEAK && (clnet_info->shatype == SHATYPE_SHA1)) {
|
|
|
+ if(err_code == SHA_TOO_WEAK_ERROR_CODE && (clnet_info->shatype == SHATYPE_SHA1)) {
|
|
|
clnet_info->shatype = SHATYPE_SHA256;
|
|
|
recalculate_restapi_hmac();
|
|
|
}
|
|
|
@@ -728,7 +728,7 @@ static int turn_channel_bind(int verbose, uint16_t *chn,
|
|
|
} else if (stun_is_challenge_response_str(message.buf, (size_t)message.len,
|
|
|
&err_code,err_msg,sizeof(err_msg),
|
|
|
clnet_info->realm,clnet_info->nonce)) {
|
|
|
- if(err_code == SHA_TOO_WEAK && (clnet_info->shatype == SHATYPE_SHA1)) {
|
|
|
+ if(err_code == SHA_TOO_WEAK_ERROR_CODE && (clnet_info->shatype == SHATYPE_SHA1)) {
|
|
|
clnet_info->shatype = SHATYPE_SHA256;
|
|
|
recalculate_restapi_hmac();
|
|
|
}
|
|
|
@@ -839,7 +839,7 @@ static int turn_create_permission(int verbose, app_ur_conn_info *clnet_info,
|
|
|
} else if (stun_is_challenge_response_str(message.buf, (size_t)message.len,
|
|
|
&err_code,err_msg,sizeof(err_msg),
|
|
|
clnet_info->realm,clnet_info->nonce)) {
|
|
|
- if(err_code == SHA_TOO_WEAK && (clnet_info->shatype == SHATYPE_SHA1)) {
|
|
|
+ if(err_code == SHA_TOO_WEAK_ERROR_CODE && (clnet_info->shatype == SHATYPE_SHA1)) {
|
|
|
clnet_info->shatype = SHATYPE_SHA256;
|
|
|
recalculate_restapi_hmac();
|
|
|
}
|
|
|
@@ -1418,7 +1418,7 @@ static int turn_tcp_connection_bind(int verbose, app_ur_conn_info *clnet_info, a
|
|
|
} else if (stun_is_challenge_response_str(message.buf, (size_t)message.len,
|
|
|
&err_code,err_msg,sizeof(err_msg),
|
|
|
clnet_info->realm,clnet_info->nonce)) {
|
|
|
- if(err_code == SHA_TOO_WEAK && (clnet_info->shatype == SHATYPE_SHA1)) {
|
|
|
+ if(err_code == SHA_TOO_WEAK_ERROR_CODE && (clnet_info->shatype == SHATYPE_SHA1)) {
|
|
|
clnet_info->shatype = SHATYPE_SHA256;
|
|
|
recalculate_restapi_hmac();
|
|
|
}
|