src/server/daemon/sessionhandler.c

changeset 197
23fa058ae54b
parent 195
d367b687bc74
child 354
017eda1be105
equal deleted inserted replaced
196:0459c94a60ed 197:23fa058ae54b
295 case SSL_ERROR_ZERO_RETURN: errstr = "SSL_ERROR_ZERO_RETURN"; break; 295 case SSL_ERROR_ZERO_RETURN: errstr = "SSL_ERROR_ZERO_RETURN"; break;
296 case SSL_ERROR_WANT_CONNECT: errstr = "SSL_ERROR_WANT_CONNECT"; break; 296 case SSL_ERROR_WANT_CONNECT: errstr = "SSL_ERROR_WANT_CONNECT"; break;
297 case SSL_ERROR_WANT_ACCEPT: errstr = "SSL_ERROR_WANT_ACCEPT"; break; 297 case SSL_ERROR_WANT_ACCEPT: errstr = "SSL_ERROR_WANT_ACCEPT"; break;
298 case SSL_ERROR_WANT_X509_LOOKUP: errstr = "SSL_ERROR_WANT_X509_LOOKUP"; break; 298 case SSL_ERROR_WANT_X509_LOOKUP: errstr = "SSL_ERROR_WANT_X509_LOOKUP"; break;
299 case SSL_ERROR_SYSCALL: errstr = "SSL_ERROR_SYSCALL"; break; 299 case SSL_ERROR_SYSCALL: errstr = "SSL_ERROR_SYSCALL"; break;
300 case SSL_ERROR_SSL: errstr = "SSL_ERROR_SSL"; break; 300 case SSL_ERROR_SSL: errstr = "SSL_ERROR_SSL"; break;
301 301 }
302 log_ereport(LOG_VERBOSE, "SSL accept error[%d]: %s", error, errstr); 302 log_ereport(LOG_VERBOSE, "SSL accept error[%d]: %s", error, errstr);
303 event->finish = evt_request_error; 303 event->finish = evt_request_error;
304 io->error = 1; 304 io->error = 1;
305 return 0; 305 return 0;
306 }
307 } 306 }
308 conn->ssl_accepted = WS_TRUE; 307 conn->ssl_accepted = WS_TRUE;
309 308
310 // SSL_accept successful, start request input now 309 // SSL_accept successful, start request input now
311 event->fn = evt_request_input; 310 event->fn = evt_request_input;

mercurial