From fd506dfe086a9595a6824485bae37f65a1b71328 Mon Sep 17 00:00:00 2001 From: bol-van Date: Sun, 21 Sep 2025 13:17:52 +0300 Subject: [PATCH] nfqws: print sessionID lengths if dupsid cannot be applied --- nfq/desync.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/nfq/desync.c b/nfq/desync.c index 4f9db848..c29065da 100644 --- a/nfq/desync.c +++ b/nfq/desync.c @@ -891,7 +891,7 @@ static bool runtime_tls_mod(int fake_n,const struct fake_tls_mod_cache *modcache if (payload_len<44) DLOG("fake[%d] cannot apply dupsid tls mod. data payload is too short.\n",fake_n); else if (fake_data[43]!=payload[43]) - DLOG("fake[%d] cannot apply dupsid tls mod. fake and orig session id length mismatch.\n",fake_n); + DLOG("fake[%d] cannot apply dupsid tls mod. fake and orig session id length mismatch : %u!=%u.\n",fake_n,fake_data[43],payload[43]); else if (payload_len<(44+payload[43])) DLOG("fake[%d] cannot apply dupsid tls mod. data payload is not valid.\n",fake_n); else