From 7603230ed1bedfdfc22f8eddab0fda1c47dfd901 Mon Sep 17 00:00:00 2001 From: Joe Orton Date: Thu, 3 May 2018 12:25:32 +0000 Subject: [PATCH] * modules/ssl: Add some missing logno tags. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1830816 13f79535-47bb-0310-9956-ffa450edef68 --- docs/log-message-tags/next-number | 2 +- modules/ssl/ssl_engine_init.c | 2 +- modules/ssl/ssl_engine_kernel.c | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/log-message-tags/next-number b/docs/log-message-tags/next-number index cdf5ccdeff..6adec3be44 100644 --- a/docs/log-message-tags/next-number +++ b/docs/log-message-tags/next-number @@ -1 +1 @@ -10127 +10130 diff --git a/modules/ssl/ssl_engine_init.c b/modules/ssl/ssl_engine_init.c index 21e2b2b9d3..cbcadc711f 100644 --- a/modules/ssl/ssl_engine_init.c +++ b/modules/ssl/ssl_engine_init.c @@ -947,7 +947,7 @@ static apr_status_t ssl_init_ctx_cipher_suite(server_rec *s, #ifdef SSL_OP_NO_TLSv1_3 if (mctx->auth.tls13_ciphers && !SSL_CTX_set_ciphersuites(ctx, mctx->auth.tls13_ciphers)) { - ap_log_error(APLOG_MARK, APLOG_EMERG, 0, s, APLOGNO() + ap_log_error(APLOG_MARK, APLOG_EMERG, 0, s, APLOGNO(10127) "Unable to configure permitted TLSv1.3 ciphers"); ssl_log_ssl_error(SSLLOG_MARK, APLOG_EMERG, s); return ssl_die(s); diff --git a/modules/ssl/ssl_engine_kernel.c b/modules/ssl/ssl_engine_kernel.c index ae16f91ada..e310c09aa3 100644 --- a/modules/ssl/ssl_engine_kernel.c +++ b/modules/ssl/ssl_engine_kernel.c @@ -1197,7 +1197,7 @@ static int ssl_hook_Access_modern(request_rec *r, SSLSrvConfigRec *sc, SSLDirCon : sc->server->auth.verify_depth; if (sslconn->verify_depth < n) { change_vmode = TRUE; - ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO() + ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(10128) "Reduced client verification depth will " "force renegotiation"); } @@ -1216,7 +1216,7 @@ static int ssl_hook_Access_modern(request_rec *r, SSLSrvConfigRec *sc, SSLDirCon return HTTP_FORBIDDEN; } - ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO() "verify client post handshake"); + ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(10129) "verify client post handshake"); SSL_set_verify(ssl, vmode_needed, ssl_callback_SSLVerify); SSL_verify_client_post_handshake(ssl); -- 2.40.0