Return-Path: Delivered-To: apmail-httpd-dev-archive@www.apache.org Received: (qmail 56874 invoked from network); 5 Apr 2008 15:58:47 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 5 Apr 2008 15:58:47 -0000 Received: (qmail 24127 invoked by uid 500); 5 Apr 2008 15:58:45 -0000 Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 24057 invoked by uid 500); 5 Apr 2008 15:58:44 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 24041 invoked by uid 99); 5 Apr 2008 15:58:44 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Sat, 05 Apr 2008 08:58:44 -0700 X-ASF-Spam-Status: No, hits=0.0 required=10.0 tests= X-Spam-Check-By: apache.org Received: from [140.211.11.9] (HELO minotaur.apache.org) (140.211.11.9) by apache.org (qpsmtpd/0.29) with SMTP; Sat, 05 Apr 2008 15:58:01 +0000 Received: (qmail 56764 invoked by uid 2161); 5 Apr 2008 15:58:20 -0000 Received: from [192.168.2.4] (euler.heimnetz.de [192.168.2.4]) by cerberus.heimnetz.de (Postfix on SuSE Linux 7.0 (i386)) with ESMTP id 6B3D51721C for ; Sat, 5 Apr 2008 17:56:27 +0200 (CEST) Message-ID: <47F7A195.3050801@gmx.de> Date: Sat, 05 Apr 2008 17:58:13 +0200 From: =?ISO-8859-1?Q?R=FCdiger_Pl=FCm?= User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.13) Gecko/20080313 SeaMonkey/1.1.9 MIME-Version: 1.0 To: dev@httpd.apache.org Subject: Re: svn commit: r644746 - in /httpd/httpd/trunk: ./ docs/manual/mod/ include/ modules/session/ server/ References: <20080404155822.A0C211A9832@eris.apache.org> <47F788DF.8000702@apache.org> <47F79A19.10609@sharp.fm> In-Reply-To: <47F79A19.10609@sharp.fm> X-Enigmail-Version: 0.95.6 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 8bit X-Virus-Checked: Checked by ClamAV on apache.org On 04/05/2008 05:26 PM, Graham Leggett wrote: > Ruediger Pluem wrote: > >>> +AP_DECLARE(int) ap_unescape_all(char *url); >>> + >>> +/** >> >> Doesn't this require a minor bump? > > I think it does do, yes. Fixed. > >>> +AP_DECLARE(char *) ap_escape_path_segment_b(char *c, const char *s); >> >> This is not a very descriptive name. Shouldn't it be better >> ap_escape_path_segment_buffer? > > It was originally buffer, then I changed it because it was too long. > You're right though, will change. Just saw it. I guess you missed to fix the name in the modules that call it. > >>> +AP_DECLARE(void) ap_session_get(request_rec * r, session_rec * z, >>> const char *key, const char **value) >>> +{ >>> + if (!z) { >>> + ap_session_load(r, &z); >> >> Not checking the return value can lead to segfaults as z can be invalid. > > The real check is to ensure that z is set, the return value can be > successful but z can still be NULL (which will happen if no session is > configured), so checking the return value won't help. Ok, but then we should ensure that z will be at least NULL for proper checking. AFAICT we do not set *z to NULL in ap_session_load in the case of an error. So it z may point to an arbitrary location in the memory. Regards R�diger