{
char *err;
X509 *x509;
+ u_long n;
EVP_PKEY *pkey;
+ ngx_uint_t mask;
STACK_OF(X509) *chain;
- chain = ngx_ssl_cache_connection_fetch(cache, pool, NGX_SSL_CACHE_CERT,
+ mask = 0;
+
+retry:
+
+ chain = ngx_ssl_cache_connection_fetch(cache, pool,
+ NGX_SSL_CACHE_CERT | mask,
&err, cert, NULL);
if (chain == NULL) {
if (err != NULL) {
#endif
- pkey = ngx_ssl_cache_connection_fetch(cache, pool, NGX_SSL_CACHE_PKEY,
+ pkey = ngx_ssl_cache_connection_fetch(cache, pool,
+ NGX_SSL_CACHE_PKEY | mask,
&err, key, passwords);
if (pkey == NULL) {
if (err != NULL) {
}
if (SSL_use_PrivateKey(c->ssl->connection, pkey) == 0) {
+ EVP_PKEY_free(pkey);
+
+ /* there can be mismatched pairs on uneven cache update */
+
+ n = ERR_peek_last_error();
+
+ if (ERR_GET_LIB(n) == ERR_LIB_X509
+ && ERR_GET_REASON(n) == X509_R_KEY_VALUES_MISMATCH
+ && mask == 0)
+ {
+ ERR_clear_error();
+ mask = NGX_SSL_CACHE_INVALIDATE;
+ goto retry;
+ }
+
ngx_ssl_error(NGX_LOG_ERR, c->log, 0,
"SSL_use_PrivateKey(\"%s\") failed", key->data);
- EVP_PKEY_free(pkey);
return NGX_ERROR;
}
#define NGX_SSL_CACHE_CRL 2
#define NGX_SSL_CACHE_CA 3
+#define NGX_SSL_CACHE_INVALIDATE 0x80000000
+
ngx_int_t ngx_ssl_init(ngx_log_t *log);
ngx_int_t ngx_ssl_create(ngx_ssl_t *ssl, ngx_uint_t protocols, void *data);
void *value;
time_t now;
uint32_t hash;
+ ngx_uint_t invalidate;
ngx_file_info_t fi;
ngx_ssl_cache_key_t id;
ngx_ssl_cache_type_t *type;
*err = NULL;
+ invalidate = index & NGX_SSL_CACHE_INVALIDATE;
+ index &= ~NGX_SSL_CACHE_INVALIDATE;
+
if (ngx_ssl_cache_init_key(pool, index, path, &id) != NGX_OK) {
return NULL;
}
goto found;
}
- if (now - cn->created <= cache->valid) {
+ if (!invalidate && now - cn->created <= cache->valid) {
goto found;
}
if (ngx_file_info(id.data, &fi) != NGX_FILE_ERROR) {
- if (ngx_file_uniq(&fi) == cn->uniq
+ if (!invalidate
+ && ngx_file_uniq(&fi) == cn->uniq
&& ngx_file_mtime(&fi) == cn->mtime)
{
break;