]> git.ipfire.org Git - thirdparty/apache/httpd.git/commitdiff
mod_ssl: log revoked certificates at level INFO
authorRainer Jung <rjung@apache.org>
Fri, 15 Feb 2013 15:42:12 +0000 (15:42 +0000)
committerRainer Jung <rjung@apache.org>
Fri, 15 Feb 2013 15:42:12 +0000 (15:42 +0000)
instead of DEBUG.

PR 52162

Partial backport of r1165056 from trunk/2.4.x.

Submitted by: sf
Backported by: rjung
Reviewed by: wrowe, rpluem

git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x@1446637 13f79535-47bb-0310-9956-ffa450edef68

CHANGES
STATUS
modules/ssl/ssl_engine_kernel.c

diff --git a/CHANGES b/CHANGES
index 2f113a9f5aca3d972bcdf71a54d6f0381cd6fef1..a7e415d5d328d1a6a9c17aa7a8dd0c9bcbd0f21b 100644 (file)
--- a/CHANGES
+++ b/CHANGES
@@ -1,6 +1,9 @@
                                                          -*- coding: utf-8 -*-
 Changes with Apache 2.2.24
 
+  *) mod_ssl: log revoked certificates at level INFO
+     instead of DEBUG. PR 52162. [Stefan Fritsch]
+
   *) mod_proxy_ajp: Support unknown HTTP methods. PR 54416.
      [Rainer Jung]
 
diff --git a/STATUS b/STATUS
index a968bc337957cca89dc72e1717abb1d02c7e9d2d..92889220afc1d7e076ef6d37b9695be7b1cd0d6b 100644 (file)
--- a/STATUS
+++ b/STATUS
@@ -94,11 +94,6 @@ RELEASE SHOWSTOPPERS:
 PATCHES ACCEPTED TO BACKPORT FROM TRUNK:
   [ start all new proposals below, under PATCHES PROPOSED. ]
 
-   * mod_ssl: PR 52162: log revoked certificates at level INFO instead of DEBUG
-     trunk/2.4.x: Changed as part of http://svn.apache.org/viewvc?rev=1165056&view=rev
-     2.2.x patch: https://issues.apache.org/bugzilla/attachment.cgi?id=27913
-     +1: sf, wrowe, rpluem
-
    * mod_ssl: When receiving http on https, send the error response with http 1.0
      It is important that we send a proper error status, or search engines
      may index the error message.
index 315ccafc1496eb92fd99e82a15e83b05c982cea7..a7bd6e51b367ef7b26f7df90d56ba63294082d18 100644 (file)
@@ -1588,7 +1588,7 @@ int ssl_callback_SSLVerify_CRL(int ok, X509_STORE_CTX *ctx, conn_rec *c)
             ASN1_INTEGER *sn = X509_REVOKED_get_serialNumber(revoked);
 
             if (!ASN1_INTEGER_cmp(sn, X509_get_serialNumber(cert))) {
-                if (s->loglevel >= APLOG_DEBUG) {
+                if (s->loglevel >= APLOG_INFO) {
                     char *cp = X509_NAME_oneline(issuer, NULL, 0);
                     long serial = ASN1_INTEGER_get(sn);