mirror of
https://github.com/apache/httpd.git
synced 2025-08-07 04:02:58 +03:00
Add some more log message tags
Add some more mod_ssl macros that confuse coccinelle. Remove restriction on format string because it causes coccinelle to not consider multi line format strings. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1210284 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
@@ -410,7 +410,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
!SSL_set_cipher_list(ssl, dc->szCipherSuite ?
|
||||
dc->szCipherSuite :
|
||||
sc->server->auth.cipher_suite)) {
|
||||
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
|
||||
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r, APLOGNO(02253)
|
||||
"Unable to reconfigure (per-directory) "
|
||||
"permitted SSL ciphers");
|
||||
ssl_log_ssl_error(SSLLOG_MARK, APLOG_ERR, r->server);
|
||||
@@ -507,7 +507,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
dc->nVerifyDepth : sc->server->auth.verify_depth;
|
||||
if (sslconn->verify_depth < n) {
|
||||
renegotiate = TRUE;
|
||||
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
|
||||
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(02254)
|
||||
"Reduced client verification depth will force "
|
||||
"renegotiation");
|
||||
}
|
||||
@@ -571,7 +571,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
X509_free(peercert);
|
||||
}
|
||||
|
||||
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
|
||||
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(02255)
|
||||
"Changed client verification type will force "
|
||||
"%srenegotiation",
|
||||
renegotiate_quick ? "quick " : "");
|
||||
@@ -601,7 +601,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
if (MODSSL_CFG_CA_NE(ca_cert_file, sc, hssc) ||
|
||||
MODSSL_CFG_CA_NE(ca_cert_path, sc, hssc)) {
|
||||
if (verify & SSL_VERIFY_FAIL_IF_NO_PEER_CERT) {
|
||||
ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r,
|
||||
ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r, APLOGNO(02256)
|
||||
"Non-default virtual host with SSLVerify set to "
|
||||
"'require' and VirtualHost-specific CA certificate "
|
||||
"list is only available to clients with TLS server "
|
||||
@@ -651,7 +651,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
}
|
||||
|
||||
if (rv) {
|
||||
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
|
||||
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02257)
|
||||
"could not buffer message body to allow "
|
||||
"SSL renegotiation to proceed");
|
||||
return rv;
|
||||
@@ -680,7 +680,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
STACK_OF(X509) *cert_stack;
|
||||
|
||||
/* perform just a manual re-verification of the peer */
|
||||
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
|
||||
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(02258)
|
||||
"Performing quick renegotiation: "
|
||||
"just re-verifying the peer");
|
||||
|
||||
@@ -756,7 +756,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
* discarded. Legimately pipelined HTTP requests will be
|
||||
* retried anyway with this approach. */
|
||||
if (has_buffered_data(r)) {
|
||||
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
|
||||
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02259)
|
||||
"insecure SSL re-negotiation required, but "
|
||||
"a pipelined request is present; keepalive "
|
||||
"disabled");
|
||||
@@ -764,7 +764,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
}
|
||||
|
||||
/* Perform a full renegotiation. */
|
||||
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
|
||||
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(02260)
|
||||
"Performing full renegotiation: complete handshake "
|
||||
"protocol (%s support secure renegotiation)",
|
||||
#if defined(SSL_get_secure_renegotiation_support)
|
||||
@@ -808,7 +808,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
sslconn->reneg_state = RENEG_REJECT;
|
||||
|
||||
if (SSL_get_state(ssl) != SSL_ST_OK) {
|
||||
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
|
||||
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02261)
|
||||
"Re-negotiation handshake failed: "
|
||||
"Not accepted by client!?");
|
||||
|
||||
@@ -837,7 +837,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
(sc->server->auth.verify_mode == SSL_CVERIFY_REQUIRE));
|
||||
|
||||
if (do_verify && (SSL_get_verify_result(ssl) != X509_V_OK)) {
|
||||
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
|
||||
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02262)
|
||||
"Re-negotiation handshake failed: "
|
||||
"Client verification failed");
|
||||
|
||||
@@ -846,7 +846,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
|
||||
if (do_verify) {
|
||||
if ((peercert = SSL_get_peer_certificate(ssl)) == NULL) {
|
||||
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
|
||||
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02263)
|
||||
"Re-negotiation handshake failed: "
|
||||
"Client certificate missing");
|
||||
|
||||
@@ -863,7 +863,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
if (cipher_list) {
|
||||
cipher = SSL_get_current_cipher(ssl);
|
||||
if (sk_SSL_CIPHER_find(cipher_list, cipher) < 0) {
|
||||
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
|
||||
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02264)
|
||||
"SSL cipher suite not renegotiated: "
|
||||
"access to %s denied using cipher %s",
|
||||
r->filename,
|
||||
@@ -902,7 +902,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
ok = ap_expr_exec(r, req->mpExpr, &errstring);
|
||||
|
||||
if (ok < 0) {
|
||||
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
|
||||
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02265)
|
||||
"access to %s failed, reason: Failed to execute "
|
||||
"SSL requirement expression: %s",
|
||||
r->filename, errstring);
|
||||
@@ -914,7 +914,7 @@ int ssl_hook_Access(request_rec *r)
|
||||
}
|
||||
|
||||
if (ok != 1) {
|
||||
ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r,
|
||||
ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r, APLOGNO(02266)
|
||||
"Access to %s denied for %s "
|
||||
"(requirement expression not fulfilled)",
|
||||
r->filename, r->client_ip);
|
||||
@@ -1596,12 +1596,12 @@ int ssl_callback_proxy_cert(SSL *ssl, X509 **x509, EVP_PKEY **pkey)
|
||||
STACK_OF(X509) **ca_cert_chains;
|
||||
int i, j, k;
|
||||
|
||||
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, s,
|
||||
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, s, APLOGNO(02267)
|
||||
SSLPROXY_CERT_CB_LOG_FMT "entered",
|
||||
sc->vhost_id);
|
||||
|
||||
if (!certs || (sk_X509_INFO_num(certs) <= 0)) {
|
||||
ap_log_error(APLOG_MARK, APLOG_WARNING, 0, s,
|
||||
ap_log_error(APLOG_MARK, APLOG_WARNING, 0, s, APLOGNO(02268)
|
||||
SSLPROXY_CERT_CB_LOG_FMT
|
||||
"downstream server wanted client certificate "
|
||||
"but none are configured", sc->vhost_id);
|
||||
@@ -1663,7 +1663,7 @@ int ssl_callback_proxy_cert(SSL *ssl, X509 **x509, EVP_PKEY **pkey)
|
||||
} /* end loop through available certs */
|
||||
}
|
||||
|
||||
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, s,
|
||||
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, s, APLOGNO(02269)
|
||||
SSLPROXY_CERT_CB_LOG_FMT
|
||||
"no client certificate found!?", sc->vhost_id);
|
||||
|
||||
|
Reference in New Issue
Block a user