summaryrefslogtreecommitdiffstats
path: root/modules/ssl/ssl_scache.c
diff options
context:
space:
mode:
authorStefan Fritsch <sf@apache.org>2011-12-03 00:02:04 +0100
committerStefan Fritsch <sf@apache.org>2011-12-03 00:02:04 +0100
commit92e366007c7936f44eef10f88a7042bc5a663c05 (patch)
tree491eaace700df8e1a764c7dfbe25335d497d0dcb /modules/ssl/ssl_scache.c
parentmod_proxy: Make ap_proxy_retry_worker() into an optional function. Allows (diff)
downloadapache2-92e366007c7936f44eef10f88a7042bc5a663c05.tar.xz
apache2-92e366007c7936f44eef10f88a7042bc5a663c05.zip
Add lots of unique tags to error log messages
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1209766 13f79535-47bb-0310-9956-ffa450edef68
Diffstat (limited to 'modules/ssl/ssl_scache.c')
-rw-r--r--modules/ssl/ssl_scache.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/modules/ssl/ssl_scache.c b/modules/ssl/ssl_scache.c
index e75c4c6154..2c8d1bc8ad 100644
--- a/modules/ssl/ssl_scache.c
+++ b/modules/ssl/ssl_scache.c
@@ -61,7 +61,7 @@ void ssl_scache_init(server_rec *s, apr_pool_t *p)
rv = mc->stapling_cache->init(mc->stapling_cache_context,
"mod_ssl-stapling", &hints, s, p);
if (rv) {
- ap_log_error(APLOG_MARK, APLOG_EMERG, 0, s,
+ ap_log_error(APLOG_MARK, APLOG_EMERG, 0, s, APLOGNO(01872)
"Could not initialize stapling cache. Exiting.");
ssl_die();
}
@@ -73,7 +73,7 @@ void ssl_scache_init(server_rec *s, apr_pool_t *p)
* But we can operate without it, of course.
*/
if (mc->sesscache == NULL) {
- ap_log_error(APLOG_MARK, APLOG_WARNING, 0, s,
+ ap_log_error(APLOG_MARK, APLOG_WARNING, 0, s, APLOGNO(01873)
"Init: Session Cache is not configured "
"[hint: SSLSessionCache]");
return;
@@ -86,7 +86,7 @@ void ssl_scache_init(server_rec *s, apr_pool_t *p)
rv = mc->sesscache->init(mc->sesscache_context, "mod_ssl-session", &hints, s, p);
if (rv) {
- ap_log_error(APLOG_MARK, APLOG_EMERG, 0, s,
+ ap_log_error(APLOG_MARK, APLOG_EMERG, 0, s, APLOGNO(01874)
"Could not initialize session cache. Exiting.");
ssl_die();
}
@@ -120,7 +120,7 @@ BOOL ssl_scache_store(server_rec *s, UCHAR *id, int idlen,
/* Serialise the session. */
len = i2d_SSL_SESSION(sess, NULL);
if (len > sizeof encoded) {
- ap_log_error(APLOG_MARK, APLOG_ERR, 0, s,
+ ap_log_error(APLOG_MARK, APLOG_ERR, 0, s, APLOGNO(01875)
"session is too big (%u bytes)", len);
return FALSE;
}