And the lognos
authorJim Jagielski <jim@apache.org>
Tue, 31 Mar 2015 19:23:11 +0000 (19:23 +0000)
committerJim Jagielski <jim@apache.org>
Tue, 31 Mar 2015 19:23:11 +0000 (19:23 +0000)
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1670440 13f79535-47bb-0310-9956-ffa450edef68

modules/ssl/ssl_engine_kernel.c

index 29fccccd914fee56ab09a5176a8a8dd2b84ff9c2..fe3302a3225b74b9a36db8b0332480e8855ac065 100644 (file)
@@ -2235,7 +2235,7 @@ int ssl_callback_alpn_select(SSL *ssl,
     
     if (inlen == 0) {
         // someone tries to trick us?
-        ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO()
+        ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO(02837)
                       "alpn client protocol list empty");
         return SSL_TLSEXT_ERR_ALERT_FATAL;
     }
@@ -2245,7 +2245,7 @@ int ssl_callback_alpn_select(SSL *ssl,
         unsigned int plen = in[i++];
         if (plen + i > inlen) {
             // someone tries to trick us?
-            ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO()
+            ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO(02838)
                           "alpn protocol identier too long");
             return SSL_TLSEXT_ERR_ALERT_FATAL;
         }
@@ -2280,7 +2280,7 @@ int ssl_callback_alpn_select(SSL *ssl,
     }
 
     if (proposed_protos->nelts <= 0) {
-        ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO()
+        ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO(02839)
                       "none of the client alpn protocols are supported");
         return SSL_TLSEXT_ERR_ALERT_FATAL;
     }
@@ -2297,7 +2297,7 @@ int ssl_callback_alpn_select(SSL *ssl,
     
     size_t len = strlen((const char*)*out);
     if (len > 255) {
-        ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO()
+        ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO(02840)
                       "alpn negotiated protocol name too long");
         return SSL_TLSEXT_ERR_ALERT_FATAL;
     }