diff src/http/modules/ngx_http_proxy_module.c @ 138:8e6d4d96ec4c NGINX_0_3_16

nginx 0.3.16 *) Feature: the ngx_http_map_module. *) Feature: the "types_hash_max_size" and "types_hash_bucket_size" directives. *) Feature: the "ssi_value_length" directive. *) Feature: the "worker_rlimit_core" directive. *) Workaround: the connection number in logs was always 1 if nginx was built by the icc 8.1 or 9.0 compilers with optimization for Pentium 4. *) Bugfix: the "config timefmt" SSI command set incorrect time format. *) Bugfix: nginx did not close connection to IMAP/POP3 backend for the SSL connections; bug appeared in 0.3.13. Thanks to Rob Mueller. *) Bugfix: segmentation fault may occurred in at SSL shutdown; bug appeared in 0.3.13.
author Igor Sysoev <http://sysoev.ru>
date Fri, 16 Dec 2005 00:00:00 +0300
parents 91372f004adf
children 55a211e5eeb7
line wrap: on
line diff
--- a/src/http/modules/ngx_http_proxy_module.c
+++ b/src/http/modules/ngx_http_proxy_module.c
@@ -42,7 +42,7 @@ typedef struct {
     ngx_array_t                 *body_set;
     ngx_array_t                 *headers_set_len;
     ngx_array_t                 *headers_set;
-    ngx_hash_t                  *headers_set_hash;
+    ngx_hash0_t                 *headers_set_hash;
 
     ngx_array_t                 *headers_source;
     ngx_array_t                 *headers_names;
@@ -1892,7 +1892,7 @@ ngx_http_proxy_merge_loc_conf(ngx_conf_t
     *code = (uintptr_t) NULL;
 
 
-    conf->headers_set_hash = ngx_pcalloc(cf->pool, sizeof(ngx_hash_t));
+    conf->headers_set_hash = ngx_pcalloc(cf->pool, sizeof(ngx_hash0_t));
     if (conf->headers_set_hash == NULL) {
         return NGX_CONF_ERROR;
     }
@@ -1902,8 +1902,9 @@ ngx_http_proxy_merge_loc_conf(ngx_conf_t
     conf->headers_set_hash->bucket_size = sizeof(ngx_str_t);
     conf->headers_set_hash->name = "proxy_headers";
 
-    if (ngx_hash_init(conf->headers_set_hash, cf->pool,
-              conf->headers_names->elts, conf->headers_names->nelts) != NGX_OK)
+    if (ngx_hash0_init(conf->headers_set_hash, cf->pool,
+                       conf->headers_names->elts, conf->headers_names->nelts)
+        != NGX_OK)
     {
         return NGX_CONF_ERROR;
     }