diff --git a/include/haproxy/connection-t.h b/include/haproxy/connection-t.h index c395f113d..753ee022c 100644 --- a/include/haproxy/connection-t.h +++ b/include/haproxy/connection-t.h @@ -238,7 +238,7 @@ enum { CO_ER_SOCKS4_DENY, /* SOCKS4 Proxy deny the request */ CO_ER_SOCKS4_ABORT, /* SOCKS4 Proxy handshake aborted by server */ - CO_ERR_SSL_FATAL, /* SSL fatal error during a SSL_read or SSL_write */ + CO_ER_SSL_FATAL, /* SSL fatal error during a SSL_read or SSL_write */ CO_ER_REVERSE, /* Error during reverse connect */ }; diff --git a/src/connection.c b/src/connection.c index a3c6a0199..971adef78 100644 --- a/src/connection.c +++ b/src/connection.c @@ -755,7 +755,7 @@ const char *conn_err_code_str(struct connection *c) case CO_ER_SOCKS4_DENY: return "SOCKS4 Proxy deny the request"; case CO_ER_SOCKS4_ABORT: return "SOCKS4 Proxy handshake aborted by server"; - case CO_ERR_SSL_FATAL: return "SSL fatal error"; + case CO_ER_SSL_FATAL: return "SSL fatal error"; case CO_ER_REVERSE: return "Reverse connect failure"; } diff --git a/src/ssl_sock.c b/src/ssl_sock.c index e2e9af4ff..49ed7e796 100644 --- a/src/ssl_sock.c +++ b/src/ssl_sock.c @@ -6442,7 +6442,7 @@ static size_t ssl_sock_to_buf(struct connection *conn, void *xprt_ctx, struct bu struct ssl_sock_ctx *ctx = conn_get_ssl_sock_ctx(conn); if (ctx && !ctx->error_code) ctx->error_code = ERR_peek_error(); - conn->err_code = CO_ERR_SSL_FATAL; + conn->err_code = CO_ER_SSL_FATAL; } /* For SSL_ERROR_SYSCALL, make sure to clear the error * stack before shutting down the connection for @@ -6618,7 +6618,7 @@ static size_t ssl_sock_from_buf(struct connection *conn, void *xprt_ctx, const s if (ctx && !ctx->error_code) ctx->error_code = ERR_peek_error(); - conn->err_code = CO_ERR_SSL_FATAL; + conn->err_code = CO_ER_SSL_FATAL; } goto out_error; }