int increment_sslconn();
void ssl_sock_load_cert_sni(struct ckch_inst *ckch_inst, struct bind_conf *bind_conf);
-struct sni_ctx *ssl_sock_chose_sni_ctx(struct bind_conf *s, struct connection *conn,
+struct sni_ctx *ssl_sock_choose_sni_ctx(struct bind_conf *s, struct connection *conn,
const char *servername, int have_rsa_sig, int have_ecdsa_sig);
#ifdef SSL_MODE_ASYNC
void ssl_async_fd_handler(int fd);
if (warnifnotcap(curproxy, PR_CAP_FE, file, linenum, args[0], NULL))
err_code |= ERR_WARN;
if (*(args[1]) == 0) {
- ha_alert("parsine [%s:%d] : '%s' expects a number. Got no argument\n",
+ ha_alert("parsing [%s:%d] : '%s' expects a number. Got no argument\n",
file, linenum, args[0]);
err_code |= ERR_ALERT | ERR_FATAL;
goto out;
ret = 1;
}
else {
- memprintf(err, "'%s' keyword not unhandled (please report this bug).", args[0]);
+ memprintf(err, "'%s' keyword not handled (please report this bug).", args[0]);
ret = -1;
}
ret = 1;
}
else {
- memprintf(err, "'%s' keyword not unhandled (please report this bug).", args[0]);
+ memprintf(err, "'%s' keyword not handled (please report this bug).", args[0]);
return -1;
}
}
if (!(curpx->mode & PR_MODE_HTTP)) {
- memprintf(err, "'%s' : proxy '%s' does not used HTTP mode",
+ memprintf(err, "'%s' : proxy '%s' does not use HTTP mode",
args[0], curpx->id);
return -1;
}
file, line, args[0]);
}
else {
- memprintf(err, "'%s' keyword not unhandled (please report this bug).", args[0]);
+ memprintf(err, "'%s' keyword not handled (please report this bug).", args[0]);
return -1;
}
*
* This function does a lookup in the bind_conf sni tree so the caller should lock its tree.
*/
-struct sni_ctx *ssl_sock_chose_sni_ctx(struct bind_conf *s, struct connection *conn,
+struct sni_ctx *ssl_sock_choose_sni_ctx(struct bind_conf *s, struct connection *conn,
const char *servername, int have_rsa_sig, int have_ecdsa_sig)
{
struct ebmb_node *node, *n, *node_ecdsa = NULL, *node_rsa = NULL, *node_anonymous = NULL;
trash.area[i] = 0;
HA_RWLOCK_RDLOCK(SNI_LOCK, &s->sni_lock);
- sni_ctx = ssl_sock_chose_sni_ctx(s, conn, trash.area, has_rsa_sig, has_ecdsa_sig);
+ sni_ctx = ssl_sock_choose_sni_ctx(s, conn, trash.area, has_rsa_sig, has_ecdsa_sig);
if (sni_ctx) {
/* switch ctx */
struct ssl_bind_conf *conf = sni_ctx->conf;
servername = trash.area;
HA_RWLOCK_RDLOCK(SNI_LOCK, &s->sni_lock);
- sni_ctx = ssl_sock_chose_sni_ctx(s, conn, servername, has_rsa_sig, has_ecdsa_sig);
+ sni_ctx = ssl_sock_choose_sni_ctx(s, conn, servername, has_rsa_sig, has_ecdsa_sig);
if (sni_ctx) {
/* switch ctx */
struct ssl_bind_conf *conf = sni_ctx->conf;
int key_type;
struct sni_ctx *sni_ctx;
- sni_ctx = ssl_sock_chose_sni_ctx(bind_conf, NULL, "", 1, 1);
+ sni_ctx = ssl_sock_choose_sni_ctx(bind_conf, NULL, "", 1, 1);
if (!sni_ctx)
goto mkcert_error;
struct sni_ctx *sni_ctx;
/* if we use the generate-certificates option, look for the first default cert available */
- sni_ctx = ssl_sock_chose_sni_ctx(bind_conf, NULL, "", 1, 1);
+ sni_ctx = ssl_sock_choose_sni_ctx(bind_conf, NULL, "", 1, 1);
if (!sni_ctx) {
ha_alert("Proxy '%s': no SSL certificate specified for bind '%s' and 'generate-certificates' option at [%s:%d] (use 'crt').\n",
px->id, bind_conf->arg, bind_conf->file, bind_conf->line);
status = ((status != HCHK_STATUS_UNKNOWN) ? status : HCHK_STATUS_L7RSP);
if (lf_expr_isempty(&expect->onerror_fmt))
desc = ist("HTTP content check could not find a response body");
- TRACE_ERROR("no response boduy found while expected", CHK_EV_TCPCHK_EXP|CHK_EV_TCPCHK_ERR, check);
+ TRACE_ERROR("no response body found while expected", CHK_EV_TCPCHK_EXP|CHK_EV_TCPCHK_ERR, check);
goto error;
}
desc->scope = SCOPE_CHECK;
}
else {
- memprintf(err, "invalid variable name '%.*s'. A variable name must be start by its scope. "
+ memprintf(err, "invalid variable name '%.*s'. A variable name must start with its scope. "
"The scope can be 'proc', '(p)sess', '(p)txn', '(p)req', '(p)res' or 'check'", len, name);
return 0;
}