comparison src/event/ngx_event_openssl.c @ 4228:5fef0313f2ff

Decrease of log level of some SSL handshake errors.
author Igor Sysoev <igor@sysoev.ru>
date Tue, 25 Oct 2011 15:04:09 +0000
parents cce2fd0acc0f
children 2ada2a26b24c
comparison
equal deleted inserted replaced
4227:4af8ea9c3a86 4228:5fef0313f2ff
1350 } else if (sslerr == SSL_ERROR_SSL) { 1350 } else if (sslerr == SSL_ERROR_SSL) {
1351 1351
1352 n = ERR_GET_REASON(ERR_peek_error()); 1352 n = ERR_GET_REASON(ERR_peek_error());
1353 1353
1354 /* handshake failures */ 1354 /* handshake failures */
1355 if (n == SSL_R_BLOCK_CIPHER_PAD_IS_WRONG /* 129 */ 1355 if (n == SSL_R_BAD_CHANGE_CIPHER_SPEC /* 103 */
1356 || n == SSL_R_BLOCK_CIPHER_PAD_IS_WRONG /* 129 */
1356 || n == SSL_R_DIGEST_CHECK_FAILED /* 149 */ 1357 || n == SSL_R_DIGEST_CHECK_FAILED /* 149 */
1358 || n == SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST /* 151 */
1359 || n == SSL_R_EXCESSIVE_MESSAGE_SIZE /* 152 */
1357 || n == SSL_R_LENGTH_MISMATCH /* 159 */ 1360 || n == SSL_R_LENGTH_MISMATCH /* 159 */
1358 || n == SSL_R_NO_CIPHERS_PASSED /* 182 */ 1361 || n == SSL_R_NO_CIPHERS_PASSED /* 182 */
1359 || n == SSL_R_NO_CIPHERS_SPECIFIED /* 183 */ 1362 || n == SSL_R_NO_CIPHERS_SPECIFIED /* 183 */
1363 || n == SSL_R_NO_COMPRESSION_SPECIFIED /* 187 */
1360 || n == SSL_R_NO_SHARED_CIPHER /* 193 */ 1364 || n == SSL_R_NO_SHARED_CIPHER /* 193 */
1361 || n == SSL_R_RECORD_LENGTH_MISMATCH /* 213 */ 1365 || n == SSL_R_RECORD_LENGTH_MISMATCH /* 213 */
1366 #ifdef SSL_R_PARSE_TLSEXT
1367 || n == SSL_R_PARSE_TLSEXT /* 227 */
1368 #endif
1362 || n == SSL_R_UNEXPECTED_MESSAGE /* 244 */ 1369 || n == SSL_R_UNEXPECTED_MESSAGE /* 244 */
1363 || n == SSL_R_UNEXPECTED_RECORD /* 245 */ 1370 || n == SSL_R_UNEXPECTED_RECORD /* 245 */
1364 || n == SSL_R_UNKNOWN_ALERT_TYPE /* 246 */ 1371 || n == SSL_R_UNKNOWN_ALERT_TYPE /* 246 */
1365 || n == SSL_R_UNKNOWN_PROTOCOL /* 252 */ 1372 || n == SSL_R_UNKNOWN_PROTOCOL /* 252 */
1366 || n == SSL_R_WRONG_VERSION_NUMBER /* 267 */ 1373 || n == SSL_R_WRONG_VERSION_NUMBER /* 267 */
1367 || n == SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC /* 281 */ 1374 || n == SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC /* 281 */
1375 #ifdef SSL_R_RENEGOTIATE_EXT_TOO_LONG
1376 || n == SSL_R_RENEGOTIATE_EXT_TOO_LONG /* 335 */
1377 || n == SSL_R_RENEGOTIATION_ENCODING_ERR /* 336 */
1378 || n == SSL_R_RENEGOTIATION_MISMATCH /* 337 */
1379 #endif
1380 #ifdef SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED
1381 || n == SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED /* 338 */
1382 #endif
1383 #ifdef SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING
1384 || n == SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING /* 345 */
1385 #endif
1368 || n == 1000 /* SSL_R_SSLV3_ALERT_CLOSE_NOTIFY */ 1386 || n == 1000 /* SSL_R_SSLV3_ALERT_CLOSE_NOTIFY */
1369 || n == SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE /* 1010 */ 1387 || n == SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE /* 1010 */
1370 || n == SSL_R_SSLV3_ALERT_BAD_RECORD_MAC /* 1020 */ 1388 || n == SSL_R_SSLV3_ALERT_BAD_RECORD_MAC /* 1020 */
1371 || n == SSL_R_TLSV1_ALERT_DECRYPTION_FAILED /* 1021 */ 1389 || n == SSL_R_TLSV1_ALERT_DECRYPTION_FAILED /* 1021 */
1372 || n == SSL_R_TLSV1_ALERT_RECORD_OVERFLOW /* 1022 */ 1390 || n == SSL_R_TLSV1_ALERT_RECORD_OVERFLOW /* 1022 */