|
|
@@ -2114,7 +2114,7 @@ int read_packet(int sock, void *ssl_ptr, v2_packet * v2_pkt, v3_packet ** v3_pkt
|
|
|
return -1;
|
|
|
|
|
|
packet_ver = ntohs(v2_pkt->packet_version);
|
|
|
- if (packet_ver != NRPE_PACKET_VERSION_2 && packet_ver != NRPE_PACKET_VERSION_3 && packet_ver != NRPE_PACKET_VERSION_4) {
|
|
|
+ if (packet_ver != NRPE_PACKET_VERSION_2 && packet_ver != NRPE_PACKET_VERSION_4) {
|
|
|
logit(LOG_ERR, "Error: (use_ssl == false): Request packet version was invalid!");
|
|
|
return -1;
|
|
|
}
|
|
|
@@ -2198,7 +2198,7 @@ int read_packet(int sock, void *ssl_ptr, v2_packet * v2_pkt, v3_packet ** v3_pkt
|
|
|
return -1;
|
|
|
|
|
|
packet_ver = ntohs(v2_pkt->packet_version);
|
|
|
- if (packet_ver != NRPE_PACKET_VERSION_2 && packet_ver != NRPE_PACKET_VERSION_3 && packet_ver != NRPE_PACKET_VERSION_4) {
|
|
|
+ if (packet_ver != NRPE_PACKET_VERSION_2 && packet_ver != NRPE_PACKET_VERSION_4) {
|
|
|
logit(LOG_ERR, "Error: (use_ssl == true): Request packet version was invalid!");
|
|
|
return -1;
|
|
|
}
|