diff options
author | Stefan Fritsch <sf@apache.org> | 2011-12-03 00:02:04 +0100 |
---|---|---|
committer | Stefan Fritsch <sf@apache.org> | 2011-12-03 00:02:04 +0100 |
commit | 92e366007c7936f44eef10f88a7042bc5a663c05 (patch) | |
tree | 491eaace700df8e1a764c7dfbe25335d497d0dcb /modules/ssl/ssl_scache.c | |
parent | mod_proxy: Make ap_proxy_retry_worker() into an optional function. Allows (diff) | |
download | apache2-92e366007c7936f44eef10f88a7042bc5a663c05.tar.xz apache2-92e366007c7936f44eef10f88a7042bc5a663c05.zip |
Add lots of unique tags to error log messages
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1209766 13f79535-47bb-0310-9956-ffa450edef68
Diffstat (limited to 'modules/ssl/ssl_scache.c')
-rw-r--r-- | modules/ssl/ssl_scache.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/modules/ssl/ssl_scache.c b/modules/ssl/ssl_scache.c index e75c4c6154..2c8d1bc8ad 100644 --- a/modules/ssl/ssl_scache.c +++ b/modules/ssl/ssl_scache.c @@ -61,7 +61,7 @@ void ssl_scache_init(server_rec *s, apr_pool_t *p) rv = mc->stapling_cache->init(mc->stapling_cache_context, "mod_ssl-stapling", &hints, s, p); if (rv) { - ap_log_error(APLOG_MARK, APLOG_EMERG, 0, s, + ap_log_error(APLOG_MARK, APLOG_EMERG, 0, s, APLOGNO(01872) "Could not initialize stapling cache. Exiting."); ssl_die(); } @@ -73,7 +73,7 @@ void ssl_scache_init(server_rec *s, apr_pool_t *p) * But we can operate without it, of course. */ if (mc->sesscache == NULL) { - ap_log_error(APLOG_MARK, APLOG_WARNING, 0, s, + ap_log_error(APLOG_MARK, APLOG_WARNING, 0, s, APLOGNO(01873) "Init: Session Cache is not configured " "[hint: SSLSessionCache]"); return; @@ -86,7 +86,7 @@ void ssl_scache_init(server_rec *s, apr_pool_t *p) rv = mc->sesscache->init(mc->sesscache_context, "mod_ssl-session", &hints, s, p); if (rv) { - ap_log_error(APLOG_MARK, APLOG_EMERG, 0, s, + ap_log_error(APLOG_MARK, APLOG_EMERG, 0, s, APLOGNO(01874) "Could not initialize session cache. Exiting."); ssl_die(); } @@ -120,7 +120,7 @@ BOOL ssl_scache_store(server_rec *s, UCHAR *id, int idlen, /* Serialise the session. */ len = i2d_SSL_SESSION(sess, NULL); if (len > sizeof encoded) { - ap_log_error(APLOG_MARK, APLOG_ERR, 0, s, + ap_log_error(APLOG_MARK, APLOG_ERR, 0, s, APLOGNO(01875) "session is too big (%u bytes)", len); return FALSE; } |