From: Jim Jagielski Date: Tue, 31 Mar 2015 19:23:11 +0000 (+0000) Subject: And the lognos X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=c57ea3adf00771eeb3572cb2f6526a6dc66bc5f2;p=thirdparty%2Fapache%2Fhttpd.git And the lognos git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1670440 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/modules/ssl/ssl_engine_kernel.c b/modules/ssl/ssl_engine_kernel.c index 29fccccd914..fe3302a3225 100644 --- a/modules/ssl/ssl_engine_kernel.c +++ b/modules/ssl/ssl_engine_kernel.c @@ -2235,7 +2235,7 @@ int ssl_callback_alpn_select(SSL *ssl, if (inlen == 0) { // someone tries to trick us? - ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO() + ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO(02837) "alpn client protocol list empty"); return SSL_TLSEXT_ERR_ALERT_FATAL; } @@ -2245,7 +2245,7 @@ int ssl_callback_alpn_select(SSL *ssl, unsigned int plen = in[i++]; if (plen + i > inlen) { // someone tries to trick us? - ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO() + ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO(02838) "alpn protocol identier too long"); return SSL_TLSEXT_ERR_ALERT_FATAL; } @@ -2280,7 +2280,7 @@ int ssl_callback_alpn_select(SSL *ssl, } if (proposed_protos->nelts <= 0) { - ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO() + ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO(02839) "none of the client alpn protocols are supported"); return SSL_TLSEXT_ERR_ALERT_FATAL; } @@ -2297,7 +2297,7 @@ int ssl_callback_alpn_select(SSL *ssl, size_t len = strlen((const char*)*out); if (len > 255) { - ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO() + ap_log_cerror(APLOG_MARK, APLOG_ERR, 0, c, APLOGNO(02840) "alpn negotiated protocol name too long"); return SSL_TLSEXT_ERR_ALERT_FATAL; }