11
11
*
12
12
*
13
13
* IDENTIFICATION
14
- * $Header: /cvsroot/pgsql/src/backend/libpq/be-secure.c,v 1.7 2002/06/17 07:33:25 momjian Exp $
14
+ * $Header: /cvsroot/pgsql/src/backend/libpq/be-secure.c,v 1.8 2002/06/17 15:19:28 momjian Exp $
15
15
*
16
16
* Since the server static private key ($DataDir/server.key)
17
17
* will normally be stored unencrypted so that the database
@@ -396,7 +396,7 @@ load_dh_file (int keylength)
396
396
/* is the prime the correct size? */
397
397
if (dh != NULL && 8 * DH_size (dh ) < keylength )
398
398
{
399
- elog (DEBUG1 , "DH errors (%s): %d bits expected, %d bits found" ,
399
+ elog (LOG , "DH errors (%s): %d bits expected, %d bits found" ,
400
400
fnbuf , keylength , 8 * DH_size (dh ));
401
401
dh = NULL ;
402
402
}
@@ -406,18 +406,18 @@ load_dh_file (int keylength)
406
406
{
407
407
if (DH_check (dh , & codes ))
408
408
{
409
- elog (DEBUG1 , "DH_check error (%s): %s" , fnbuf , SSLerrmessage ());
409
+ elog (LOG , "DH_check error (%s): %s" , fnbuf , SSLerrmessage ());
410
410
return NULL ;
411
411
}
412
412
if (codes & DH_CHECK_P_NOT_PRIME )
413
413
{
414
- elog (DEBUG1 , "DH error (%s): p is not prime" , fnbuf );
414
+ elog (LOG , "DH error (%s): p is not prime" , fnbuf );
415
415
return NULL ;
416
416
}
417
417
if ((codes & DH_NOT_SUITABLE_GENERATOR ) &&
418
418
(codes & DH_CHECK_P_NOT_SAFE_PRIME ))
419
419
{
420
- elog (DEBUG1 ,
420
+ elog (LOG ,
421
421
"DH error (%s): neither suitable generator or safe prime" ,
422
422
fnbuf );
423
423
return NULL ;
@@ -547,36 +547,32 @@ verify_cb (int ok, X509_STORE_CTX *ctx)
547
547
static void
548
548
info_cb (SSL * ssl , int type , int args )
549
549
{
550
- if (DebugLvl < 2 )
551
- return ;
552
-
553
550
switch (type )
554
551
{
555
- case SSL_CB_HANDSHAKE_START :
556
- elog (DEBUG1 , "SSL: handshake start" );
557
- break ;
558
- case SSL_CB_HANDSHAKE_DONE :
559
- elog (DEBUG1 , "SSL: handshake done" );
560
- break ;
561
- case SSL_CB_ACCEPT_LOOP :
562
- if (DebugLvl >= 3 )
563
- elog (DEBUG1 , "SSL: accept loop" );
564
- break ;
565
- case SSL_CB_ACCEPT_EXIT :
566
- elog (DEBUG1 , "SSL: accept exit (%d)" , args );
567
- break ;
568
- case SSL_CB_CONNECT_LOOP :
569
- elog (DEBUG1 , "SSL: connect loop" );
570
- break ;
571
- case SSL_CB_CONNECT_EXIT :
572
- elog (DEBUG1 , "SSL: connect exit (%d)" , args );
573
- break ;
574
- case SSL_CB_READ_ALERT :
575
- elog (DEBUG1 , "SSL: read alert (0x%04x)" , args );
576
- break ;
577
- case SSL_CB_WRITE_ALERT :
578
- elog (DEBUG1 , "SSL: write alert (0x%04x)" , args );
579
- break ;
552
+ case SSL_CB_HANDSHAKE_START :
553
+ elog (DEBUG3 , "SSL: handshake start" );
554
+ break ;
555
+ case SSL_CB_HANDSHAKE_DONE :
556
+ elog (DEBUG3 , "SSL: handshake done" );
557
+ break ;
558
+ case SSL_CB_ACCEPT_LOOP :
559
+ elog (DEBUG3 , "SSL: accept loop" );
560
+ break ;
561
+ case SSL_CB_ACCEPT_EXIT :
562
+ elog (DEBUG3 , "SSL: accept exit (%d)" , args );
563
+ break ;
564
+ case SSL_CB_CONNECT_LOOP :
565
+ elog (DEBUG3 , "SSL: connect loop" );
566
+ break ;
567
+ case SSL_CB_CONNECT_EXIT :
568
+ elog (DEBUG3 , "SSL: connect exit (%d)" , args );
569
+ break ;
570
+ case SSL_CB_READ_ALERT :
571
+ elog (DEBUG3 , "SSL: read alert (0x%04x)" , args );
572
+ break ;
573
+ case SSL_CB_WRITE_ALERT :
574
+ elog (DEBUG3 , "SSL: write alert (0x%04x)" , args );
575
+ break ;
580
576
}
581
577
}
582
578
0 commit comments