diff --git a/plugin/business/ssl-policy/src/ssl_policy.cpp b/plugin/business/ssl-policy/src/ssl_policy.cpp index ab096d4..498ea49 100644 --- a/plugin/business/ssl-policy/src/ssl_policy.cpp +++ b/plugin/business/ssl-policy/src/ssl_policy.cpp @@ -79,7 +79,7 @@ void intercept_param_new_cb(int table_id, const char* key, const char* table_lin TFE_LOG_ERROR(enforcer->logger, "Invalid intercept parameter: %s invalid protocol format", key); goto error_out; } - if (0!=strcasecmp(item->valuestring, "SSL/HTTP")) + if(0!=strcasecmp(item->valuestring, "SSL")&& 0!=strcasecmp(item->valuestring, "HTTP")) { goto error_out; } diff --git a/plugin/business/traffic-mirror/src/entry.cpp b/plugin/business/traffic-mirror/src/entry.cpp index 1b421e7..ceaf979 100644 --- a/plugin/business/traffic-mirror/src/entry.cpp +++ b/plugin/business/traffic-mirror/src/entry.cpp @@ -89,7 +89,7 @@ void policy_table_ex_data_new_cb(int table_id, const char * key, const char * ta TFE_LOG_ERROR(instance->logger, "invalid JSON, protocol not existed or invalid type."); goto ignore; } - if (0!=strcasecmp(json_item->valuestring, "SSL/HTTP")) + if(0!=strcasecmp(json_item->valuestring, "SSL")&& 0!=strcasecmp(json_item->valuestring, "HTTP")) { goto out; } @@ -527,7 +527,7 @@ int traffic_mirror_init(struct tfe_proxy * proxy) if(unlikely(result < 0)) { - TFE_LOG_ERROR(instance->logger, "failed at Maat_plugin_EX_register(PXY_INTERCEPT_COMPILE), " + TFE_LOG_ERROR(instance->logger, "failed at Maat_plugin_EX_register(TSG_SECURITY_COMPILE), " "table_id = %d, ret = %d", instance->policy_table_id, result); goto errout; }