Return-Path: Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 76403 invoked by uid 500); 22 Feb 2003 23:03:02 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: list-post: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 76351 invoked from network); 22 Feb 2003 23:03:01 -0000 Errors-To: Message-Id: <5.2.0.9.2.20030222164423.03570568@pop3.rowe-clan.net> X-Sender: wrowe%rowe-clan.net@pop3.rowe-clan.net X-Mailer: QUALCOMM Windows Eudora Version 5.2.0.9 Date: Sat, 22 Feb 2003 16:48:37 -0600 To: dev@httpd.apache.org From: "William A. Rowe, Jr." Subject: Re: Fix for SSLMutex bogusness Cc: dev@httpd.apache.org In-Reply-To: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" X-Spam-Rating: daedalus.apache.org 1.6.2 0/1000/N At 10:50 AM 2/22/2003, Jim Jagielski wrote: >Of course for 2.1, but also for 2.0 as well... Right now, SSLMutex >is pretty binary :) Only one observation below, otherwise ++1 for both 2.0 and 2.1 customers (Jim and I recently spent a week fighting solaris 9 pthread mutexes, extra backup options are *always* goodness!) > else { > return apr_pstrcat(cmd->pool, "Invalid SSLMutex argument ", >- arg, NULL); >+ arg, " (", ssl_valid_ssl_mutex_string, ")", NULL); the idea here was most cool, but I'd add to the "(" comment that >+ arg, " (options valid on this platform are: ", >+ ssl_valid_ssl_mutex_string, ")", NULL); Bill