nginx-0.3.16-RELEASE import

    *) Feature: the ngx_http_map_module.

    *) Feature: the "types_hash_max_size" and "types_hash_bucket_size"
       directives.

    *) Feature: the "ssi_value_length" directive.

    *) Feature: the "worker_rlimit_core" directive.

    *) Workaround: the connection number in logs was always 1 if nginx was
       built by the icc 8.1 or 9.0 compilers with optimization for
       Pentium 4.

    *) Bugfix: the "config timefmt" SSI command set incorrect time format.

    *) Bugfix: nginx did not close connection to IMAP/POP3 backend for the
       SSL connections; the bug had appeared in 0.3.13.
       Thanks to Rob Mueller.

    *) Bugfix: segmentation fault may occurred in at SSL shutdown; the bug
       had appeared in 0.3.13.
diff --git a/src/http/modules/ngx_http_proxy_module.c b/src/http/modules/ngx_http_proxy_module.c
index afadc18..c39f320 100644
--- a/src/http/modules/ngx_http_proxy_module.c
+++ b/src/http/modules/ngx_http_proxy_module.c
@@ -42,7 +42,7 @@
     ngx_array_t                 *body_set;
     ngx_array_t                 *headers_set_len;
     ngx_array_t                 *headers_set;
-    ngx_hash_t                  *headers_set_hash;
+    ngx_hash0_t                 *headers_set_hash;
 
     ngx_array_t                 *headers_source;
     ngx_array_t                 *headers_names;
@@ -1892,7 +1892,7 @@
     *code = (uintptr_t) NULL;
 
 
-    conf->headers_set_hash = ngx_pcalloc(cf->pool, sizeof(ngx_hash_t));
+    conf->headers_set_hash = ngx_pcalloc(cf->pool, sizeof(ngx_hash0_t));
     if (conf->headers_set_hash == NULL) {
         return NGX_CONF_ERROR;
     }
@@ -1902,8 +1902,9 @@
     conf->headers_set_hash->bucket_size = sizeof(ngx_str_t);
     conf->headers_set_hash->name = "proxy_headers";
 
-    if (ngx_hash_init(conf->headers_set_hash, cf->pool,
-              conf->headers_names->elts, conf->headers_names->nelts) != NGX_OK)
+    if (ngx_hash0_init(conf->headers_set_hash, cf->pool,
+                       conf->headers_names->elts, conf->headers_names->nelts)
+        != NGX_OK)
     {
         return NGX_CONF_ERROR;
     }