diff --git a/include/haproxy/connection-t.h b/include/haproxy/connection-t.h index 228f2078c..ad454a320 100644 --- a/include/haproxy/connection-t.h +++ b/include/haproxy/connection-t.h @@ -238,7 +238,7 @@ enum { CO_ER_SOCKS4_DENY, /* SOCKS4 Proxy deny the request */ CO_ER_SOCKS4_ABORT, /* SOCKS4 Proxy handshake aborted by server */ - CO_ERR_SSL_FATAL, /* SSL fatal error during a SSL_read or SSL_write */ + CO_ER_SSL_FATAL, /* SSL fatal error during a SSL_read or SSL_write */ CO_ER_REVERSE, /* Error during reverse connect */ }; diff --git a/src/connection.c b/src/connection.c index 1b644b0be..59baec65b 100644 --- a/src/connection.c +++ b/src/connection.c @@ -741,7 +741,7 @@ const char *conn_err_code_str(struct connection *c) case CO_ER_SOCKS4_DENY: return "SOCKS4 Proxy deny the request"; case CO_ER_SOCKS4_ABORT: return "SOCKS4 Proxy handshake aborted by server"; - case CO_ERR_SSL_FATAL: return "SSL fatal error"; + case CO_ER_SSL_FATAL: return "SSL fatal error"; case CO_ER_REVERSE: return "Reverse connect failure"; } diff --git a/src/ssl_sock.c b/src/ssl_sock.c index 54550f00d..7ec5bf15d 100644 --- a/src/ssl_sock.c +++ b/src/ssl_sock.c @@ -5852,7 +5852,7 @@ static size_t ssl_sock_to_buf(struct connection *conn, void *xprt_ctx, struct bu struct ssl_sock_ctx *ctx = conn_get_ssl_sock_ctx(conn); if (ctx && !ctx->error_code) ctx->error_code = ERR_peek_error(); - conn->err_code = CO_ERR_SSL_FATAL; + conn->err_code = CO_ER_SSL_FATAL; } /* For SSL_ERROR_SYSCALL, make sure to clear the error * stack before shutting down the connection for @@ -6028,7 +6028,7 @@ static size_t ssl_sock_from_buf(struct connection *conn, void *xprt_ctx, const s if (ctx && !ctx->error_code) ctx->error_code = ERR_peek_error(); - conn->err_code = CO_ERR_SSL_FATAL; + conn->err_code = CO_ER_SSL_FATAL; } goto out_error; }