)]}'
{
  "commit": "a862c46ffa3061fd24382cf37dc27a563de2bde2",
  "tree": "d7653300b1d35b8ff7b00d4d3b37ecdedacc77c8",
  "parents": [
    "0c689b7498591163dc55db3bffb8ed2664ae1452"
  ],
  "author": {
    "name": "Igor Sysoev",
    "email": "igor@sysoev.ru",
    "time": "Thu Oct 23 05:58:10 2008 +0000"
  },
  "committer": {
    "name": "Igor Sysoev",
    "email": "igor@sysoev.ru",
    "time": "Thu Oct 23 05:58:10 2008 +0000"
  },
  "message": "always use buffer, if connection is buffered,\nthis fixes OpenSSL \"bad write retry\" error, when\n*) nginx passed a single buf greater than our buffer (say 32K) to OpenSSL,\n*) OpenSSL returns SSL_ERROR_WANT_WRITE,\n*) after some time nginx has to send a new data,\n*) so there are at least two bufs nginx does pass them directly to OpenSSL,\n*) but copies the first buf part to buffer, and sends the buffer to OpenSSL.\n*) because the data length is lesser than it was in previous SSL_write():\n   16K \u003c 32K, OpenSSL returns SSL_R_BAD_WRITE_RETRY.\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "af54b50503f67c9ce92d81ad8003ff66527161ab",
      "old_mode": 33188,
      "old_path": "src/event/ngx_event_openssl.c",
      "new_id": "2b3f0711aa00199e03e7d598a5cd189f997e721d",
      "new_mode": 33188,
      "new_path": "src/event/ngx_event_openssl.c"
    }
  ]
}
