Mercurial > hg > nginx-vendor-1-0
comparison src/event/ngx_event_openssl.c @ 366:babd3d9efb62 NGINX_0_6_27
nginx 0.6.27
*) Change: now by default the rtsig method is not built on
Linux 2.6.18+.
*) Change: now a request method is not changed while redirection to a
named location via an "error_page" directive.
*) Feature: the "resolver" and "resolver_timeout" directives in SMTP
proxy.
*) Feature: the "post_action" directive supports named locations.
*) Bugfix: a segmentation fault occurred in worker process, if a
request was redirected from proxy, FastCGI, or memcached location to
static named locations.
*) Bugfix: browsers did not repeat SSL handshake if there is no valid
client certificate in first handshake.
Thanks to Alexander V. Inyukhin.
*) Bugfix: if response code 495-497 was redirected via an "error_page"
directive without code change, then nginx tried to allocate too many
memory.
*) Bugfix: memory leak in long-lived non buffered connections.
*) Bugfix: memory leak in resolver.
*) Bugfix: a segmentation fault occurred in worker process, if a
request was redirected from proxy, FastCGI, or memcached location to
static named locations.
*) Bugfix: in the $proxy_host and $proxy_port variables caching.
Thanks to Sergey Bochenkov.
*) Bugfix: a "proxy_pass" directive with variables used incorrectly the
same port as in another "proxy_pass" directive with the same host
name and without variables.
Thanks to Sergey Bochenkov.
*) Bugfix: an alert "sendmsg() failed (9: Bad file descriptor)" on some
64-bit platforms while reconfiguration.
*) Bugfix: a segmentation fault occurred in worker process, if empty
stub block was used second time in SSI.
*) Bugfix: in copying URI part contained escaped symbols into arguments.
author | Igor Sysoev <http://sysoev.ru> |
---|---|
date | Wed, 12 Mar 2008 00:00:00 +0300 |
parents | a39aab45a53f |
children | 9a242235a80a |
comparison
equal
deleted
inserted
replaced
365:9b0140fa1132 | 366:babd3d9efb62 |
---|---|
1550 | 1550 |
1551 return sess; | 1551 return sess; |
1552 } | 1552 } |
1553 | 1553 |
1554 | 1554 |
1555 void | |
1556 ngx_ssl_remove_cached_session(SSL_CTX *ssl, ngx_ssl_session_t *sess) | |
1557 { | |
1558 SSL_CTX_remove_session(ssl, sess); | |
1559 | |
1560 ngx_ssl_remove_session(ssl, sess); | |
1561 } | |
1562 | |
1563 | |
1555 static void | 1564 static void |
1556 ngx_ssl_remove_session(SSL_CTX *ssl, ngx_ssl_session_t *sess) | 1565 ngx_ssl_remove_session(SSL_CTX *ssl, ngx_ssl_session_t *sess) |
1557 { | 1566 { |
1558 size_t len; | 1567 size_t len; |
1559 u_char *id; | 1568 u_char *id; |
1565 ngx_ssl_sess_id_t *sess_id; | 1574 ngx_ssl_sess_id_t *sess_id; |
1566 ngx_ssl_session_cache_t *cache; | 1575 ngx_ssl_session_cache_t *cache; |
1567 | 1576 |
1568 shm_zone = SSL_CTX_get_ex_data(ssl, ngx_ssl_session_cache_index); | 1577 shm_zone = SSL_CTX_get_ex_data(ssl, ngx_ssl_session_cache_index); |
1569 | 1578 |
1579 if (shm_zone == NULL) { | |
1580 return; | |
1581 } | |
1582 | |
1570 cache = shm_zone->data; | 1583 cache = shm_zone->data; |
1571 | 1584 |
1572 id = sess->session_id; | 1585 id = sess->session_id; |
1573 len = (size_t) sess->session_id_length; | 1586 len = (size_t) sess->session_id_length; |
1574 | 1587 |