request->packet = rad_recv(NULL, listener->fd, 0x02); /* MSG_PEEK */
if (!request->packet) { /* badly formed, etc */
talloc_free(request);
+ ERROR("Receive - %s", fr_strerror());
goto unknown;
}
(void) talloc_steal(request, request->packet);
packet = rad_recv(NULL, listener->fd, 1); /* require message authenticator */
if (!packet) {
FR_STATS_INC(auth, total_malformed_requests);
- DEBUG("%s", fr_strerror());
+ ERROR("Receive - %s", fr_strerror());
return 0;
}
if (!packet) {
talloc_free(ctx);
FR_STATS_INC(auth, total_malformed_requests);
- DEBUG("%s", fr_strerror());
+ ERROR("Receive - %s", fr_strerror());
return 0;
}
packet = rad_recv(ctx, listener->fd, 0);
if (!packet) {
FR_STATS_INC(acct, total_malformed_requests);
- ERROR("%s", fr_strerror());
+ ERROR("Receive - %s", fr_strerror());
return 0;
}
packet = rad_recv(ctx, listener->fd, client->message_authenticator);
if (!packet) {
FR_STATS_INC(coa, total_malformed_requests);
- DEBUG("%s", fr_strerror());
+ ERROR("Receive - %s", fr_strerror());
return 0;
}
packet = rad_recv(NULL, listener->fd, 0);
if (!packet) {
- ERROR("%s", fr_strerror());
+ ERROR("Receive - %s", fr_strerror());
return 0;
}
PTHREAD_MUTEX_UNLOCK(&sock->mutex);
if (!rad_packet_ok(packet, 0, NULL)) {
- RDEBUG("Received bad packet: %s", fr_strerror());
+ ERROR("Receive - %s", fr_strerror());
DEBUG("Closing TLS socket from client");
PTHREAD_MUTEX_LOCK(&sock->mutex);
tls_socket_close(listener);