Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/nginx/nginx.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
path: root/src/event
diff options
context:
space:
mode:
authorIgor Sysoev <igor@sysoev.ru>2005-09-06 20:09:32 +0400
committerIgor Sysoev <igor@sysoev.ru>2005-09-06 20:09:32 +0400
commitceb992921cee6f76d1752af2d388ee6a1d71e078 (patch)
tree2b4916a12d02210134939b7fb388a270e76002fa /src/event
parent5650106a09de8e8d876ed38fbff57b2161d910c4 (diff)
nginx-0.1.44-RELEASE importrelease-0.1.44
*) Feature: the IMAP/POP3 proxy supports SSL. *) Feature: the "proxy_timeout" directive of the ngx_imap_proxy_module. *) Feature: the "userid_mark" directive. *) Feature: the $remote_user variable value is determined independently of authorization use.
Diffstat (limited to 'src/event')
-rw-r--r--src/event/ngx_event_accept.c1
-rw-r--r--src/event/ngx_event_acceptex.c1
-rw-r--r--src/event/ngx_event_connect.c4
-rw-r--r--src/event/ngx_event_openssl.c67
-rw-r--r--src/event/ngx_event_openssl.h1
5 files changed, 58 insertions, 16 deletions
diff --git a/src/event/ngx_event_accept.c b/src/event/ngx_event_accept.c
index 0c21e72ed..6d9f66ead 100644
--- a/src/event/ngx_event_accept.c
+++ b/src/event/ngx_event_accept.c
@@ -256,6 +256,7 @@ ngx_event_accept(ngx_event_t *ev)
c->servers = ls->servers;
c->recv = ngx_recv;
+ c->send = ngx_send;
c->send_chain = ngx_send_chain;
c->log = log;
diff --git a/src/event/ngx_event_acceptex.c b/src/event/ngx_event_acceptex.c
index 50cd21df3..bc2443dfd 100644
--- a/src/event/ngx_event_acceptex.c
+++ b/src/event/ngx_event_acceptex.c
@@ -151,6 +151,7 @@ int ngx_event_post_acceptex(ngx_listening_t *ls, int n)
c->servers = ls->servers;
c->recv = ngx_recv;
+ c->send = ngx_send;
c->send_chain = ngx_send_chain;
c->pool = ngx_create_pool(ls->pool_size, ls->log);
diff --git a/src/event/ngx_event_connect.c b/src/event/ngx_event_connect.c
index e07a33d43..7cab38cb7 100644
--- a/src/event/ngx_event_connect.c
+++ b/src/event/ngx_event_connect.c
@@ -229,6 +229,10 @@ ngx_event_connect_peer(ngx_peer_connection_t *pc)
c->write = wev;
wev->write = 1;
+ c->recv = ngx_recv;
+ c->send = ngx_send;
+ c->send_chain = ngx_send_chain;
+
c->log = pc->log;
rev->log = pc->log;
wev->log = pc->log;
diff --git a/src/event/ngx_event_openssl.c b/src/event/ngx_event_openssl.c
index 1c0f1485d..4c7deb336 100644
--- a/src/event/ngx_event_openssl.c
+++ b/src/event/ngx_event_openssl.c
@@ -13,7 +13,6 @@
static ngx_int_t ngx_ssl_handle_recv(ngx_connection_t *c, int n);
static void ngx_ssl_write_handler(ngx_event_t *wev);
-static ssize_t ngx_ssl_write(ngx_connection_t *c, u_char *data, size_t size);
static void ngx_ssl_read_handler(ngx_event_t *rev);
@@ -209,8 +208,10 @@ ngx_ssl_handle_recv(ngx_connection_t *c, int n)
}
if (sslerr == SSL_ERROR_WANT_WRITE) {
- ngx_log_error(NGX_LOG_ALERT, c->log, err,
- "SSL wants to write%s", handshake);
+
+ ngx_log_error(NGX_LOG_INFO, c->log, err,
+ "client does SSL %shandshake",
+ SSL_is_init_finished(c->ssl->ssl) ? "re" : "");
c->write->ready = 0;
@@ -391,12 +392,11 @@ ngx_ssl_send_chain(ngx_connection_t *c, ngx_chain_t *in, off_t limit)
}
-static ssize_t
+ssize_t
ngx_ssl_write(ngx_connection_t *c, u_char *data, size_t size)
{
- int n, sslerr;
- ngx_err_t err;
- char *handshake;
+ int n, sslerr;
+ ngx_err_t err;
ngx_log_debug1(NGX_LOG_DEBUG_EVENT, c->log, 0, "SSL to write: %d", size);
@@ -405,6 +405,47 @@ ngx_ssl_write(ngx_connection_t *c, u_char *data, size_t size)
ngx_log_debug1(NGX_LOG_DEBUG_EVENT, c->log, 0, "SSL_write: %d", n);
if (n > 0) {
+
+#if (NGX_DEBUG)
+
+ if (!c->ssl->handshaked && SSL_is_init_finished(c->ssl->ssl)) {
+ char buf[129], *s, *d;
+ SSL_CIPHER *cipher;
+
+ c->ssl->handshaked = 1;
+
+ cipher = SSL_get_current_cipher(c->ssl->ssl);
+
+ if (cipher) {
+ SSL_CIPHER_description(cipher, &buf[1], 128);
+
+ for (s = &buf[1], d = buf; *s; s++) {
+ if (*s == ' ' && *d == ' ') {
+ continue;
+ }
+
+ if (*s == LF || *s == CR) {
+ continue;
+ }
+
+ *++d = *s;
+ }
+
+ if (*d != ' ') {
+ d++;
+ }
+
+ *d = '\0';
+
+ ngx_log_debug1(NGX_LOG_DEBUG_EVENT, c->log, 0,
+ "SSL cipher: \"%s\"", &buf[1]);
+ } else {
+ ngx_log_debug0(NGX_LOG_DEBUG_EVENT, c->log, 0,
+ "SSL no shared ciphers");
+ }
+ }
+#endif
+
if (c->ssl->saved_read_handler) {
c->read->handler = c->ssl->saved_read_handler;
@@ -440,15 +481,9 @@ ngx_ssl_write(ngx_connection_t *c, u_char *data, size_t size)
if (sslerr == SSL_ERROR_WANT_READ) {
- if (!SSL_is_init_finished(c->ssl->ssl)) {
- handshake = " in SSL handshake";
-
- } else {
- handshake = "";
- }
-
- ngx_log_error(NGX_LOG_ALERT, c->log, err,
- "SSL wants to read%s", handshake);
+ ngx_log_error(NGX_LOG_INFO, c->log, err,
+ "client does SSL %shandshake",
+ SSL_is_init_finished(c->ssl->ssl) ? "re" : "");
c->read->ready = 0;
diff --git a/src/event/ngx_event_openssl.h b/src/event/ngx_event_openssl.h
index 8797fcd0f..7fc6bc092 100644
--- a/src/event/ngx_event_openssl.h
+++ b/src/event/ngx_event_openssl.h
@@ -49,6 +49,7 @@ ngx_int_t ngx_ssl_create_session(ngx_ssl_ctx_t *ctx, ngx_connection_t *c,
#define ngx_ssl_handshake(c) NGX_OK
ssize_t ngx_ssl_recv(ngx_connection_t *c, u_char *buf, size_t size);
+ssize_t ngx_ssl_write(ngx_connection_t *c, u_char *data, size_t size);
ngx_chain_t *ngx_ssl_send_chain(ngx_connection_t *c, ngx_chain_t *in,
off_t limit);
ngx_int_t ngx_ssl_shutdown(ngx_connection_t *c);