- 
-            
serve(): Close the client socket as well if the server socket for an inspected connection has been
-            closed. Privoxy currently can't establish a new server connection when the client socket is reused and
-            would drop the connection in continue_https_chat() anyway.
+            Allow to edit the add-header action through the CGI editor by generalizing the code that got added with
+            the suppress-tag action. Closes SF patch request #146. Patch by Maxim Antonov.
            
           - 
-            
Don't disable redirect checkers in redirect_url() Disable them in handle_established_connection()
-            instead. Doing it in redirect_url() prevented the +redirect{} and +fast-redirects{} actions from being
-            logged with LOG_LEVEL_ACTIONS.
+            Add a CGI handler for /wpad.dat that returns a Proxy Auto-Configuration (PAC) file. Among other things,
+            it can be used to instruct clients through DHCP to use Privoxy as proxy. For example with the dnsmasq
+            option: dhcp-option=252,http://config.privoxy.org/wpad.dat Initial patch by Richard Schneidt.
            
           - 
-            
handle_established_connection(): Slightly improve a comment
+            Don't log the applied actions in process_encrypted_request() Log them in continue_https_chat() instead
+            to mirror chat(). Prevents the applied actions from getting logged twice for the first request on an
+            https-inspected connection.
            
           - 
-            
handle_established_connection(): Fix a comment
+            OpenSSL generate_host_certificate(): Use config.privoxy.org as Common Name Org and Org Unit if the real
+            host name is too long to get accepted by OpenSSL. Clients should only care about the Subject Alternative
+            Name anyway and we can continue to use the real host name for it. Reported by Miles Wen on
+            privoxy-users@.
            
           - 
-            
socks5_connect(): Fix indentation.
+            Establish the TLS connection with the client earlier and decide how to route the request afterwards.
+            This allows to change the forwarding settings based on information from the https-inspected request, for
+            example the path.
            
           - 
-            
handle_established_connection(): Improve an error message
+            listen_loop(): When shutting down gracefully, close listening ports before waiting for the threads to
+            exit. Allows to start a second Privoxy with the same config file while the first Privoxy is still
+            running.
            
           - 
-            
create_pattern_spec(): Fix ifdef indentation
+            serve(): Close the client socket as well if the server socket for an inspected connection has been
+            closed. Privoxy currently can't establish a new server connection when the client socket is reused and
+            would drop the connection in continue_https_chat() anyway.
            
           - 
-            
Fix comment typos
+            Don't disable redirect checkers in redirect_url(). Disable them in handle_established_connection()
+            instead. Doing it in redirect_url() prevented the +redirect{} and +fast-redirects{} actions from being
+            logged with LOG_LEVEL_ACTIONS.
            
           - 
-            
Add a CGI handler for /wpad.dat that returns a Proxy Auto-Configuration (PAC) file. Among other things,
-            it can be used to instruct clients through DHCP to use Privoxy as proxy. For example with the dnsmasq
-            option: dhcp-option=252,http://config.privoxy.org/wpad.dat Initial patch by Richard Schneidt.
+            handle_established_connection(): Slightly improve a comment.
            
           - 
-            
listen_loop(): When shutting down gracefully, close listening ports before waiting for the threads to
-            exit. Allows to start a second Privoxy with the same config file while the first Privoxy is still
-            running.
+            handle_established_connection(): Fix a comment.
            
           - 
-            
Allow to edit the add-header action through the CGI editor by generalizing the code that got added with
-            the suppress-tag action. Closes SF patch request #146. Patch by Maxim Antonov.
+            socks5_connect(): Fix indentation.
            
           - 
-            
process_encrypted_request(): Improve a log message The function only processes request headers and there
-            may still be unread request body data left to process.
+            handle_established_connection(): Improve an error message.
            
           - 
-            
read_http_request_body(): Fix two error messages that used an incorrect variable.
+            create_pattern_spec(): Fix ifdef indentation.
+           
+          - 
+            
Fix comment typos.
+           
+          - 
+            
process_encrypted_request(): Improve a log message. The function only processes request headers and
+            there may still be unread request body data left to process.
            
           - 
             
chat(): Log the applied actions before deciding how to forward the request.
@@ -124,7 +162,7 @@
             parse_time_header(): Silence a coverity complaint when building without assertions.
            
           - 
-            
receive_encrypted_request_headers(): Improve a log message
+            receive_encrypted_request_headers(): Improve a log message.
            
           - 
             
mbedTLS get_ciphersuites_from_string(): Use strlcpy() instead of strncpy(). Previously the terminating
@@ -137,27 +175,12 @@
             doesn't know that. Get rid of several "this statement may fall through [-Wimplicit-fallthrough=]"
             warnings.
            
-          - 
-            
If the the response is chunk-encoded, ignore the Content-Length header sent by the server. Allows to
-            load https://redmine.lighttpd.net/ with filtering enabled.
-           
           - 
             
Store the PEM certificate in a dynamically allocated buffer when https-inspecting. Should prevent errors
             like: 2021-03-16 22:36:19.148 7f47bbfff700 Error: X509 PEM cert len 16694 is larger than buffer len 16383
             As a bonus it should slightly reduce the memory usage as most certificates are smaller than the previously
             used fixed buffer. Reported by: Wen Yue
            
-          - 
-            
Don't log the applied actions in process_encrypted_request() Log them in continue_https_chat() instead
-            to mirror chat(). Prevents the applied actions from getting logged twice for the first request on an
-            https-inspected connection.
-           
-          - 
-            
OpenSSL generate_host_certificate(): Use config.privoxy.org as Common Name Org and Org Unit if the real
-            host name is too long to get accepted by OpenSSL. Clients should only care about the Subject Alternative
-            Name anyway and we can continue to use the real host name for it. Reported by Miles Wen on
-            privoxy-users@.
-           
           - 
             
OpenSSL generate_host_certificate(): Fix two error messsages.
            
@@ -185,16 +208,16 @@
             Disable fast-redirects for idp.springer.com/.