[squid-dev] [PATCH] splicing resumed sessions

Tsantilas Christos chtsanti at users.sourceforge.net
Tue Apr 14 10:18:08 UTC 2015


Hi Amos,

    I make a new patch for squid-3.5. Use this one it should be OK.
It include changes from r14013.



On 04/13/2015 03:49 PM, Amos Jeffries wrote:
> On 11/04/2015 10:01 p.m., Tsantilas Christos wrote:
>> Patch applied as r14012.
>> I am attaching the t13 patch for squid-3.5 too.
>>
>
> I've backported the server_name ACL patch before this one and your 3.5
> patch does not seem to apply well on top of it.
>
> However the regular backport method "bzr merge -r15011..14013 trunk"
> seems to have only one minor collision.
>
> I'm unsure its doing the right things though. Comparing your patch to
> the changeset bzr merge produces I see these two odd chunks (in relation
> to the server_name ACL changes):
>
> --- christos.patch  2015-04-13 04:54:19.678645218 -0700
> +++ bzr_merge.patch       2015-04-13 04:33:23.514618772 -0700
> @@ -599,19 +598,15 @@
>   +    return helloMsgSize;
>   +}
>   +
> - bool
> --Ssl::Bio::sslFeatures::get(const unsigned char *hello)
> ++bool
>   +Ssl::Bio::sslFeatures::checkForCcsOrNst(const unsigned char *msg,
> size_t size)
> - {
> --    // The SSL handshake message should starts with a 0x16 byte
> --    if (hello[0] == 0x16) {
> --        return parseV3Hello(hello);
> ++{
>   +    while (size > 5) {
>   +        const int msgType = msg[0];
>   +        const int msgSslVersion = (msg[1] << 8) | msg[2];
>   +        debugs(83, 7, "SSL Message Version :" << std::hex <<
> std::setw(8) << std::setfill('0') << msgSslVersion);
>   +        // Check for Change Cipher Spec message
> -+        // RFC5246 section 6.2.1
> ++        // RFC5246 section 6.2.1
>   +        if (msgType == 0x14) {// Change Cipher Spec message found
>   +            debugs(83, 7, "SSL  Change Cipher Spec message found");
>   +            return true;
> @@ -636,9 +631,13 @@
>   +    return false;
>   +}
>   +
> -+bool
> + bool
> +-Ssl::Bio::sslFeatures::get(const unsigned char *hello)
>   +Ssl::Bio::sslFeatures::get(const MemBuf &buf, bool record)
> -+{
> + {
> +-    // The SSL handshake message should starts with a 0x16 byte
> +-    if (hello[0] == 0x16) {
> +-        return parseV3Hello(hello);
>   +    int msgSize;
>   +    if ((msgSize = parseMsgHead(buf)) <= 0) {
>   +        debugs(83, 7, "Not a known SSL handshake message");
>
>
> If you can try the bzr merge and confirm the diff/changeset is correct I
> will do that normal cherrypicking backport.
>
> Amos
>
> _______________________________________________
> squid-dev mailing list
> squid-dev at lists.squid-cache.org
> http://lists.squid-cache.org/listinfo/squid-dev
>

-------------- next part --------------
A non-text attachment was scrubbed...
Name: splicing-resumed-sessions-Squid-3.5-t14.patch
Type: text/x-patch
Size: 57984 bytes
Desc: not available
URL: <http://lists.squid-cache.org/pipermail/squid-dev/attachments/20150414/9d6ae3a3/attachment-0001.bin>


More information about the squid-dev mailing list