<feed xmlns='http://www.w3.org/2005/Atom'>
<title>nginx.git/src/event, branch release-1.6.3</title>
<subtitle>nginx</subtitle>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/'/>
<entry>
<title>SSL: logging level of "inappropriate fallback" (ticket #662).</title>
<updated>2014-11-17T13:38:48+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-11-17T13:38:48+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=de557628d3518ec016787fae7036e430ba2f4874'/>
<id>de557628d3518ec016787fae7036e430ba2f4874</id>
<content type='text'>
Patch by Erik Dubbelboer.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Patch by Erik Dubbelboer.
</pre>
</div>
</content>
</entry>
<entry>
<title>SSL: session id context now includes certificate hash.</title>
<updated>2014-09-15T13:59:47+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-09-15T13:59:47+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=1c5943c21f4e54a0ffbd6ff4c9fdfe3a0bea8ca9'/>
<id>1c5943c21f4e54a0ffbd6ff4c9fdfe3a0bea8ca9</id>
<content type='text'>
This prevents inappropriate session reuse in unrelated server{}
blocks, while preserving ability to restore sessions on other servers
when using TLS Session Tickets.

Additionally, session context is now set even if there is no session cache
configured.  This is needed as it's also used for TLS Session Tickets.

Thanks to Antoine Delignat-Lavaud and Piotr Sikora.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This prevents inappropriate session reuse in unrelated server{}
blocks, while preserving ability to restore sessions on other servers
when using TLS Session Tickets.

Additionally, session context is now set even if there is no session cache
configured.  This is needed as it's also used for TLS Session Tickets.

Thanks to Antoine Delignat-Lavaud and Piotr Sikora.
</pre>
</div>
</content>
</entry>
<entry>
<title>Win32: fixed shared ssl_session_cache (ticket #528).</title>
<updated>2014-04-07T14:55:57+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-04-07T14:55:57+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=55bef3047488310e0c8474afa5158190d8040576'/>
<id>55bef3047488310e0c8474afa5158190d8040576</id>
<content type='text'>
In a worker process shm_zone-&gt;data was set to NULL instead of a proper value
extracted from shared memory.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In a worker process shm_zone-&gt;data was set to NULL instead of a proper value
extracted from shared memory.
</pre>
</div>
</content>
</entry>
<entry>
<title>Core: slab log_nomem flag.</title>
<updated>2014-03-31T17:38:30+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-03-31T17:38:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=23f66898463308fdc70ab2659273fb9804f29370'/>
<id>23f66898463308fdc70ab2659273fb9804f29370</id>
<content type='text'>
The flag allows to suppress "ngx_slab_alloc() failed: no memory" messages
from a slab allocator, e.g., if an LRU expiration is used by a consumer
and allocation failures aren't fatal.

The flag is now used in the SSL session cache code, and in the limit_req
module.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The flag allows to suppress "ngx_slab_alloc() failed: no memory" messages
from a slab allocator, e.g., if an LRU expiration is used by a consumer
and allocation failures aren't fatal.

The flag is now used in the SSL session cache code, and in the limit_req
module.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fixed format specifier in logging of "c-&gt;number".</title>
<updated>2014-03-06T14:25:59+00:00</updated>
<author>
<name>Sergey Kandaurov</name>
<email>pluknet@nginx.com</email>
</author>
<published>2014-03-06T14:25:59+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=bd3516e8d98815a540ff65451889f6a2a0991c71'/>
<id>bd3516e8d98815a540ff65451889f6a2a0991c71</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>SSL: the $ssl_session_reused variable.</title>
<updated>2014-02-11T15:20:25+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-02-11T15:20:25+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=381d5074677ff2b5eb27ed627d4772f51795f3e2'/>
<id>381d5074677ff2b5eb27ed627d4772f51795f3e2</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>SSL: fixed $ssl_session_id possible segfault after 97e3769637a7.</title>
<updated>2014-01-23T14:32:26+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-01-23T14:32:26+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=1ebb44e3e3dcc7e321819a54915e9eff2aa1aa81'/>
<id>1ebb44e3e3dcc7e321819a54915e9eff2aa1aa81</id>
<content type='text'>
Even during execution of a request it is possible that there will be
no session available, notably in case of renegotiation.  As a result
logging of $ssl_session_id in some cases caused NULL pointer dereference
after revision 97e3769637a7 (1.5.9).  The check added returns an empty
string if there is no session available.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Even during execution of a request it is possible that there will be
no session available, notably in case of renegotiation.  As a result
logging of $ssl_session_id in some cases caused NULL pointer dereference
after revision 97e3769637a7 (1.5.9).  The check added returns an empty
string if there is no session available.
</pre>
</div>
</content>
</entry>
<entry>
<title>SSL: fixed $ssl_session_id variable.</title>
<updated>2014-01-22T12:05:06+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-01-22T12:05:06+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=096bcd03c30280778178fd3698afd56a8e3938e5'/>
<id>096bcd03c30280778178fd3698afd56a8e3938e5</id>
<content type='text'>
Previously, it used to contain full session serialized instead of just
a session id, making it almost impossible to use the variable in a safe
way.

Thanks to Ivan Ristić.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Previously, it used to contain full session serialized instead of just
a session id, making it almost impossible to use the variable in a safe
way.

Thanks to Ivan Ristić.
</pre>
</div>
</content>
</entry>
<entry>
<title>SSL: ssl_buffer_size directive.</title>
<updated>2013-12-20T12:18:25+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2013-12-20T12:18:25+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=37b7de6df74b29153b4bfd0da5bef28fb4dbda77'/>
<id>37b7de6df74b29153b4bfd0da5bef28fb4dbda77</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Resolver: implemented IPv6 name to address resolving.</title>
<updated>2013-12-09T06:53:28+00:00</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@nginx.com</email>
</author>
<published>2013-12-09T06:53:28+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=769eded73267274e018f460dd76b417538aa5934'/>
<id>769eded73267274e018f460dd76b417538aa5934</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
