@@ -398,7 +398,7 @@ std::shared_ptr<SSLContext> newSSLClientContext(
398
398
{
399
399
auto checkCA =
400
400
SSL_CTX_load_verify_locations (ctx->get (), caPath.c_str (), NULL );
401
- LOG_DEBUG << " CA CHECK LOC: " << checkCA;
401
+ LOG_TRACE << " CA CHECK LOC: " << checkCA;
402
402
if (checkCA)
403
403
{
404
404
STACK_OF (X509_NAME) *cert_names =
@@ -485,7 +485,7 @@ void TcpConnectionImpl::startClientEncryptionInLoop(
485
485
sslEncryptionPtr_->sslCtxPtr_ ->mtlsEnabled );
486
486
if (validateCert || sslEncryptionPtr_->sslPtr_ ->mtlsEnabled )
487
487
{
488
- LOG_DEBUG << " MTLS: " << sslEncryptionPtr_->sslPtr_ ->mtlsEnabled ;
488
+ LOG_TRACE << " MTLS: " << sslEncryptionPtr_->sslPtr_ ->mtlsEnabled ;
489
489
SSL_set_verify (sslEncryptionPtr_->sslPtr_ ->get (),
490
490
sslEncryptionPtr_->sslPtr_ ->mtlsEnabled
491
491
? SSL_VERIFY_PEER
@@ -532,7 +532,7 @@ void TcpConnectionImpl::startServerEncryptionInLoop(
532
532
if (sslEncryptionPtr_->isServer_ == false ||
533
533
sslEncryptionPtr_->sslPtr_ ->mtlsEnabled )
534
534
{
535
- LOG_DEBUG << " MTLS: " << sslEncryptionPtr_->sslPtr_ ->mtlsEnabled ;
535
+ LOG_TRACE << " MTLS: " << sslEncryptionPtr_->sslPtr_ ->mtlsEnabled ;
536
536
SSL_set_verify (sslEncryptionPtr_->sslPtr_ ->get (),
537
537
sslEncryptionPtr_->sslPtr_ ->mtlsEnabled
538
538
? SSL_VERIFY_PEER
@@ -652,25 +652,25 @@ void TcpConnectionImpl::readCallback()
652
652
if (errno == EPIPE || errno == ECONNRESET)
653
653
{
654
654
#ifdef _WIN32
655
- LOG_DEBUG << " WSAENOTCONN or WSAECONNRESET, errno=" << errno
655
+ LOG_TRACE << " WSAENOTCONN or WSAECONNRESET, errno=" << errno
656
656
<< " fd=" << socketPtr_->fd ();
657
657
#else
658
- LOG_DEBUG << " EPIPE or ECONNRESET, errno=" << errno
658
+ LOG_TRACE << " EPIPE or ECONNRESET, errno=" << errno
659
659
<< " fd=" << socketPtr_->fd ();
660
660
#endif
661
661
return ;
662
662
}
663
663
#ifdef _WIN32
664
664
if (errno == WSAECONNABORTED)
665
665
{
666
- LOG_DEBUG << " WSAECONNABORTED, errno=" << errno;
666
+ LOG_TRACE << " WSAECONNABORTED, errno=" << errno;
667
667
handleClose ();
668
668
return ;
669
669
}
670
670
#else
671
671
if (errno == EAGAIN) // TODO: any others?
672
672
{
673
- LOG_DEBUG << " EAGAIN, errno=" << errno
673
+ LOG_TRACE << " EAGAIN, errno=" << errno
674
674
<< " fd=" << socketPtr_->fd ();
675
675
return ;
676
676
}
@@ -821,11 +821,11 @@ void TcpConnectionImpl::writeCallback()
821
821
if (errno == EPIPE || errno == ECONNRESET)
822
822
{
823
823
#ifdef _WIN32
824
- LOG_DEBUG
824
+ LOG_TRACE
825
825
<< " WSAENOTCONN or WSAECONNRESET, errno="
826
826
<< errno;
827
827
#else
828
- LOG_DEBUG << " EPIPE or ECONNRESET, errno=" << errno;
828
+ LOG_TRACE << " EPIPE or ECONNRESET, errno=" << errno;
829
829
#endif
830
830
return ;
831
831
}
@@ -880,11 +880,11 @@ void TcpConnectionImpl::writeCallback()
880
880
if (errno == EPIPE || errno == ECONNRESET)
881
881
{
882
882
#ifdef _WIN32
883
- LOG_DEBUG << " WSAENOTCONN or "
883
+ LOG_TRACE << " WSAENOTCONN or "
884
884
" WSAECONNRESET, errno="
885
885
<< errno;
886
886
#else
887
- LOG_DEBUG << " EPIPE or "
887
+ LOG_TRACE << " EPIPE or "
888
888
" ECONNRESET, erron="
889
889
<< errno;
890
890
#endif
@@ -996,7 +996,7 @@ void TcpConnectionImpl::handleError()
996
996
#endif
997
997
err == ECONNRESET)
998
998
{
999
- LOG_DEBUG << " [" << name_ << " ] - SO_ERROR = " << err << " "
999
+ LOG_TRACE << " [" << name_ << " ] - SO_ERROR = " << err << " "
1000
1000
<< strerror_tl (err);
1001
1001
}
1002
1002
else
@@ -1079,10 +1079,10 @@ void TcpConnectionImpl::sendInLoop(const char *buffer, size_t length)
1079
1079
if (errno == EPIPE || errno == ECONNRESET) // TODO: any others?
1080
1080
{
1081
1081
#ifdef _WIN32
1082
- LOG_DEBUG << " WSAENOTCONN or WSAECONNRESET, errno="
1082
+ LOG_TRACE << " WSAENOTCONN or WSAECONNRESET, errno="
1083
1083
<< errno;
1084
1084
#else
1085
- LOG_DEBUG << " EPIPE or ECONNRESET, errno=" << errno;
1085
+ LOG_TRACE << " EPIPE or ECONNRESET, errno=" << errno;
1086
1086
#endif
1087
1087
return ;
1088
1088
}
@@ -1698,13 +1698,13 @@ void TcpConnectionImpl::sendFileInLoop(const BufferNodePtr &filePtr)
1698
1698
if (errno == EPIPE || errno == ECONNRESET)
1699
1699
{
1700
1700
#ifdef _WIN32
1701
- LOG_DEBUG << " WSAENOTCONN or WSAECONNRESET, errno="
1701
+ LOG_TRACE << " WSAENOTCONN or WSAECONNRESET, errno="
1702
1702
<< errno;
1703
1703
#else
1704
- LOG_DEBUG << " EPIPE or ECONNRESET, errno=" << errno;
1704
+ LOG_TRACE << " EPIPE or ECONNRESET, errno=" << errno;
1705
1705
#endif
1706
1706
// abort
1707
- LOG_DEBUG
1707
+ LOG_TRACE
1708
1708
<< " send stream in loop: return on connection closed" ;
1709
1709
filePtr->fileBytesToSend_ = 0 ;
1710
1710
return ;
@@ -1788,12 +1788,12 @@ void TcpConnectionImpl::sendFileInLoop(const BufferNodePtr &filePtr)
1788
1788
if (errno == EPIPE || errno == ECONNRESET)
1789
1789
{
1790
1790
#ifdef _WIN32
1791
- LOG_DEBUG << " WSAENOTCONN or WSAECONNRESET, errno="
1791
+ LOG_TRACE << " WSAENOTCONN or WSAECONNRESET, errno="
1792
1792
<< errno;
1793
1793
#else
1794
- LOG_DEBUG << " EPIPE or ECONNRESET, errno=" << errno;
1794
+ LOG_TRACE << " EPIPE or ECONNRESET, errno=" << errno;
1795
1795
#endif
1796
- LOG_DEBUG
1796
+ LOG_TRACE
1797
1797
<< " send file in loop: return on connection closed" ;
1798
1798
return ;
1799
1799
}
@@ -1937,7 +1937,7 @@ TcpConnectionImpl::TcpConnectionImpl(EventLoop *loop,
1937
1937
validateCert_ = validateCert;
1938
1938
if (isServer == false || sslEncryptionPtr_->sslPtr_ ->mtlsEnabled )
1939
1939
{
1940
- LOG_DEBUG << " MTLS: " << sslEncryptionPtr_->sslPtr_ ->mtlsEnabled ;
1940
+ LOG_TRACE << " MTLS: " << sslEncryptionPtr_->sslPtr_ ->mtlsEnabled ;
1941
1941
SSL_set_verify (sslEncryptionPtr_->sslPtr_ ->get (),
1942
1942
sslEncryptionPtr_->sslPtr_ ->mtlsEnabled
1943
1943
? SSL_VERIFY_PEER
@@ -1975,14 +1975,14 @@ bool TcpConnectionImpl::validatePeerCertificate()
1975
1975
result != X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN &&
1976
1976
result != X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY)
1977
1977
{
1978
- LOG_DEBUG << " cert error code: " << result;
1978
+ LOG_TRACE << " cert error code: " << result;
1979
1979
LOG_ERROR << " Server certificate is not valid" ;
1980
1980
return false ;
1981
1981
}
1982
1982
#else
1983
1983
if (result != X509_V_OK && result)
1984
1984
{
1985
- LOG_DEBUG << " cert error code: " << result;
1985
+ LOG_TRACE << " cert error code: " << result;
1986
1986
LOG_ERROR << " Server certificate is not valid" ;
1987
1987
return false ;
1988
1988
}
@@ -2000,7 +2000,7 @@ bool TcpConnectionImpl::validatePeerCertificate()
2000
2000
internal::verifyAltName (cert, sslEncryptionPtr_->hostname_ );
2001
2001
X509_free (cert);
2002
2002
2003
- LOG_DEBUG << " domainIsValid: " << domainIsValid;
2003
+ LOG_TRACE << " domainIsValid: " << domainIsValid;
2004
2004
2005
2005
// if mtlsEnabled, ignore domain validation
2006
2006
if (sslEncryptionPtr_->sslPtr_ ->mtlsEnabled || domainIsValid)
0 commit comments