Return-Path: X-Original-To: apmail-httpd-dev-archive@www.apache.org Delivered-To: apmail-httpd-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 26CBCED24 for ; Wed, 29 May 2013 15:15:47 +0000 (UTC) Received: (qmail 84701 invoked by uid 500); 29 May 2013 15:15:46 -0000 Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 84459 invoked by uid 500); 29 May 2013 15:15:46 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 84431 invoked by uid 99); 29 May 2013 15:15:45 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 29 May 2013 15:15:45 +0000 X-ASF-Spam-Status: No, hits=-5.0 required=5.0 tests=RCVD_IN_DNSWL_HI,SPF_HELO_PASS,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of jorton@redhat.com designates 209.132.183.28 as permitted sender) Received: from [209.132.183.28] (HELO mx1.redhat.com) (209.132.183.28) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 29 May 2013 15:15:38 +0000 Received: from int-mx11.intmail.prod.int.phx2.redhat.com (int-mx11.intmail.prod.int.phx2.redhat.com [10.5.11.24]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id r4TFE68u002663 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Wed, 29 May 2013 11:14:06 -0400 Received: from iberis.manyfish.co.uk (vpn-48-45.rdu2.redhat.com [10.10.48.45]) by int-mx11.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id r4TFE56O027818 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 29 May 2013 11:14:05 -0400 Received: from jorton by iberis.manyfish.co.uk with local (Exim 4.80.1) (envelope-from ) id 1Uhi4i-0006oA-IF; Wed, 29 May 2013 16:14:04 +0100 Date: Wed, 29 May 2013 16:14:04 +0100 From: Joe Orton To: Matthew Steele Cc: dev@httpd.apache.org, Guenter Knauf Subject: Re: mod_ssl NPN API rejig (was Re: Intent to revert commit r1332643) Message-ID: <20130529151404.GA24489@redhat.com> Mail-Followup-To: Matthew Steele , dev@httpd.apache.org, Guenter Knauf References: <5196405C.4070203@apache.org> <20130529143634.GA24081@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Organization: Registered in England and Wales under Company Registration No. 03798903 Directors: Michael Cunningham (USA), Mark Hegarty (Ireland), Matt Parson (USA), Charlie Peters (USA) X-Scanned-By: MIMEDefang 2.68 on 10.5.11.24 X-Virus-Checked: Checked by ClamAV on apache.org Hi Matthew - thanks for taking a look at the patch so quickly. On Wed, May 29, 2013 at 10:52:10AM -0400, Matthew Steele wrote: > Two questions about this change: > > - In modssl_register_npn, it appears that the code creates > new npn_advertfns and npn_negofns arrays on every call, even if they > already exist. This would seem to prevent multiple modules from > registering callbacks. Presumably this is not intended? Am I misreading > the code? No, just a braino. Updated patch attached. > - The old optional hooks were both declared as RUN_ALL, but the new > implementation seems to stop calling callbacks as soon as one returns OK, > which is different behavior than before. Is there a reason for this change? I was wondering about this. The API description weakly implies that OK does something different to DECLINED in both cases, which is not true for RUN_ALL; so I presumed RUN_FIRST was desired. Are RUN_ALL semantics desired? Regards, Joe