Log error on ssltcp failures (fake ssl handshake)
Followup to https://webrtc-review.googlesource.com/c/src/+/229384.
Bug: None
Change-Id: I9d0a4f29514b5699f90e9a8af1457a7b68de3bd0
Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/229586
Reviewed-by: Taylor Brandstetter <deadbeef@webrtc.org>
Reviewed-by: Harald Alvestrand <hta@webrtc.org>
Commit-Queue: Niels Moller <nisse@webrtc.org>
Cr-Commit-Position: refs/heads/main@{#34833}
diff --git a/rtc_base/socket_adapters.cc b/rtc_base/socket_adapters.cc
index cc541a4..ee8ec87 100644
--- a/rtc_base/socket_adapters.cc
+++ b/rtc_base/socket_adapters.cc
@@ -183,6 +183,7 @@
// TODO: we could buffer output too...
const int res = DirectSend(kSslClientHello, sizeof(kSslClientHello));
if (res != sizeof(kSslClientHello)) {
+ RTC_LOG(LS_ERROR) << "Sending fake SSL ClientHello message failed.";
Close();
SignalCloseEvent(this, 0);
}
@@ -193,6 +194,7 @@
return;
if (memcmp(kSslServerHello, data, sizeof(kSslServerHello)) != 0) {
+ RTC_LOG(LS_ERROR) << "Received non-matching fake SSL ServerHello message.";
Close();
SignalCloseEvent(this, 0); // TODO: error code?
return;