From abf1f3e23fbc4411c5e80c66e08e947be91578ec Mon Sep 17 00:00:00 2001 From: Jim Jagielski Date: Tue, 31 Mar 2015 19:23:11 +0000 Subject: [PATCH] And the lognos git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1670440 13f79535-47bb-0310-9956-ffa450edef68 --- modules/ssl/ssl_engine_kernel.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/modules/ssl/ssl_engine_kernel.c b/modules/ssl/ssl_engine_kernel.c index 29fccccd91..fe3302a322 100644 --- a/modules/ssl/ssl_engine_kernel.c +++ b/modules/ssl/ssl_engine_kernel.c @@ -2235,7 +2235,7 @@ int ssl_callback_alpn_select(SSL *ssl, if (inlen == 0) { // someone tries to trick us? - ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO() + ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO(02837) "alpn client protocol list empty"); return SSL_TLSEXT_ERR_ALERT_FATAL; } @@ -2245,7 +2245,7 @@ int ssl_callback_alpn_select(SSL *ssl, unsigned int plen = in[i++]; if (plen + i > inlen) { // someone tries to trick us? - ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO() + ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO(02838) "alpn protocol identier too long"); return SSL_TLSEXT_ERR_ALERT_FATAL; } @@ -2280,7 +2280,7 @@ int ssl_callback_alpn_select(SSL *ssl, } if (proposed_protos->nelts <= 0) { - ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO() + ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO(02839) "none of the client alpn protocols are supported"); return SSL_TLSEXT_ERR_ALERT_FATAL; } @@ -2297,7 +2297,7 @@ int ssl_callback_alpn_select(SSL *ssl, size_t len = strlen((const char*)*out); if (len > 255) { - ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO() + ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO(02840) "alpn negotiated protocol name too long"); return SSL_TLSEXT_ERR_ALERT_FATAL; } -- 2.40.0