@@ -1527,6 +1527,7 @@ ngx_http_lua_socket_tcp_check_busy(ngx_http_request_t *r,
15271527 return NULL ;
15281528}
15291529
1530+
15301531int
15311532ngx_http_lua_ffi_socket_tcp_tlshandshake (ngx_http_request_t * r ,
15321533 ngx_http_lua_socket_tcp_upstream_t * u , ngx_ssl_session_t * sess ,
@@ -1568,7 +1569,7 @@ ngx_http_lua_ffi_socket_tcp_tlshandshake(ngx_http_request_t *r,
15681569 }
15691570
15701571 if (u -> raw_downstream || u -> body_downstream ) {
1571- * errmsg = "not supported for downstream" ;
1572+ * errmsg = "not supported for downstream sockets " ;
15721573 return NGX_ERROR ;
15731574 }
15741575
@@ -1609,7 +1610,7 @@ ngx_http_lua_ffi_socket_tcp_tlshandshake(ngx_http_request_t *r,
16091610
16101611 if (sess != NULL ) {
16111612 if (ngx_ssl_set_session (c , sess ) != NGX_OK ) {
1612- * errmsg = "lua tls set session failed" ;
1613+ * errmsg = "tls set session failed" ;
16131614 return NGX_ERROR ;
16141615 }
16151616
@@ -1632,13 +1633,13 @@ ngx_http_lua_ffi_socket_tcp_tlshandshake(ngx_http_request_t *r,
16321633 x509 = sk_X509_value (chain , 0 );
16331634 if (x509 == NULL ) {
16341635 ERR_clear_error ();
1635- * errmsg = "lua tls fetch client certificate from chain failed" ;
1636+ * errmsg = "tls fetch client certificate from chain failed" ;
16361637 return NGX_ERROR ;
16371638 }
16381639
16391640 if (SSL_use_certificate (ssl_conn , x509 ) == 0 ) {
16401641 ERR_clear_error ();
1641- * errmsg = "lua tls set client certificate failed" ;
1642+ * errmsg = "tls set client certificate failed" ;
16421643 return NGX_ERROR ;
16431644 }
16441645
@@ -1648,21 +1649,21 @@ ngx_http_lua_ffi_socket_tcp_tlshandshake(ngx_http_request_t *r,
16481649 x509 = sk_X509_value (chain , i );
16491650 if (x509 == NULL ) {
16501651 ERR_clear_error ();
1651- * errmsg = "lua tls fetch client intermediate certificate "
1652- "from chain failed" ;
1652+ * errmsg = "tls fetch client intermediate certificate from "
1653+ "chain failed" ;
16531654 return NGX_ERROR ;
16541655 }
16551656
16561657 if (SSL_add1_chain_cert (ssl_conn , x509 ) == 0 ) {
16571658 ERR_clear_error ();
1658- * errmsg = "lua tls set client intermediate certificate failed" ;
1659+ * errmsg = "tls set client intermediate certificate failed" ;
16591660 return NGX_ERROR ;
16601661 }
16611662 }
16621663
16631664 if (SSL_use_PrivateKey (ssl_conn , pkey ) == 0 ) {
16641665 ERR_clear_error ();
1665- * errmsg = "lua ssl set client private key failed" ;
1666+ * errmsg = "tls set client private key failed" ;
16661667 return NGX_ERROR ;
16671668 }
16681669 }
@@ -1681,7 +1682,7 @@ ngx_http_lua_ffi_socket_tcp_tlshandshake(ngx_http_request_t *r,
16811682 }
16821683
16831684#else
1684- * errmsg = "OpenSSL has no SNI support" ;
1685+ * errmsg = "no TLS extension support" ;
16851686 return NGX_ERROR ;
16861687#endif
16871688 }
@@ -1724,7 +1725,6 @@ ngx_http_lua_ffi_socket_tcp_tlshandshake(ngx_http_request_t *r,
17241725 u -> ssl_name .data = ngx_alloc (server_name -> len , ngx_cycle -> log );
17251726 if (u -> ssl_name .data == NULL ) {
17261727 u -> ssl_name .len = 0 ;
1727-
17281728 * errmsg = "no memory" ;
17291729 return NGX_ERROR ;
17301730 }
@@ -1745,7 +1745,7 @@ ngx_http_lua_ffi_socket_tcp_tlshandshake(ngx_http_request_t *r,
17451745 rc = ngx_ssl_handshake (c );
17461746
17471747 ngx_log_debug1 (NGX_LOG_DEBUG_HTTP , r -> connection -> log , 0 ,
1748- "ngx_ssl_handshake returned %d" , rc );
1748+ "ngx_ssl_handshake returned: %d" , rc );
17491749
17501750 if (rc == NGX_AGAIN ) {
17511751 if (c -> write -> timer_set ) {
@@ -1777,7 +1777,6 @@ ngx_http_lua_ffi_socket_tcp_tlshandshake(ngx_http_request_t *r,
17771777
17781778 if (rc == NGX_ERROR ) {
17791779 * errmsg = u -> error_ret ;
1780-
17811780 return NGX_ERROR ;
17821781 }
17831782
@@ -1891,7 +1890,6 @@ ngx_http_lua_tls_handshake_handler(ngx_connection_t *c)
18911890}
18921891
18931892
1894-
18951893int
18961894ngx_http_lua_ffi_socket_tcp_get_tlshandshake_result (ngx_http_request_t * r ,
18971895 ngx_http_lua_socket_tcp_upstream_t * u , ngx_ssl_session_t * * sess ,
0 commit comments