Return-Path: Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 47683 invoked by uid 500); 5 Oct 2001 04:36:41 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: list-post: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 47355 invoked from network); 5 Oct 2001 04:36:39 -0000 Date: Thu, 4 Oct 2001 21:36:23 -0700 From: Justin Erenkrantz To: dev@httpd.apache.org Subject: Re: [PATCH] mod_ssl input filtering... Message-ID: <20011004213623.Y21545@ebuilt.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.3.22.1i X-AntiVirus: scanned for viruses by AMaViS 0.2.1-pre3 (http://amavis.org/) X-Spam-Rating: daedalus.apache.org 1.6.2 0/1000/N On Thu, Oct 04, 2001 at 09:09:46PM -0400, MATHIHALLI,MADHUSUDAN (HP-Cupertino,ex1) wrote: > HTTP filters.. But, I have some concerns : > Some applications may legitimately ask for x bytes, some may ask for a upper > limit of x bytes, and some other may want to have all the data in the > channel (SSL).. I see what you mean now. =) Try asking for 1024 bytes when there aren't that many bytes. =) apr_brigade_partition blocks. Yuck. The core needs to handle non-blocking reads via non-blocking socket reads. Going to have to fix that... =) -- justin