diff --git a/docs/log-message-tags/next-number b/docs/log-message-tags/next-number index cdf5ccdeff..6adec3be44 100644 --- a/docs/log-message-tags/next-number +++ b/docs/log-message-tags/next-number @@ -1 +1 @@ -10127 +10130 diff --git a/modules/ssl/ssl_engine_init.c b/modules/ssl/ssl_engine_init.c index 21e2b2b9d3..cbcadc711f 100644 --- a/modules/ssl/ssl_engine_init.c +++ b/modules/ssl/ssl_engine_init.c @@ -947,7 +947,7 @@ static apr_status_t ssl_init_ctx_cipher_suite(server_rec *s, #ifdef SSL_OP_NO_TLSv1_3 if (mctx->auth.tls13_ciphers && !SSL_CTX_set_ciphersuites(ctx, mctx->auth.tls13_ciphers)) { - ap_log_error(APLOG_MARK, APLOG_EMERG, 0, s, APLOGNO() + ap_log_error(APLOG_MARK, APLOG_EMERG, 0, s, APLOGNO(10127) "Unable to configure permitted TLSv1.3 ciphers"); ssl_log_ssl_error(SSLLOG_MARK, APLOG_EMERG, s); return ssl_die(s); diff --git a/modules/ssl/ssl_engine_kernel.c b/modules/ssl/ssl_engine_kernel.c index ae16f91ada..e310c09aa3 100644 --- a/modules/ssl/ssl_engine_kernel.c +++ b/modules/ssl/ssl_engine_kernel.c @@ -1197,7 +1197,7 @@ static int ssl_hook_Access_modern(request_rec *r, SSLSrvConfigRec *sc, SSLDirCon : sc->server->auth.verify_depth; if (sslconn->verify_depth < n) { change_vmode = TRUE; - ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO() + ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(10128) "Reduced client verification depth will " "force renegotiation"); } @@ -1216,7 +1216,7 @@ static int ssl_hook_Access_modern(request_rec *r, SSLSrvConfigRec *sc, SSLDirCon return HTTP_FORBIDDEN; } - ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO() "verify client post handshake"); + ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(10129) "verify client post handshake"); SSL_set_verify(ssl, vmode_needed, ssl_callback_SSLVerify); SSL_verify_client_post_handshake(ssl);