ap_send_fd ignores the offset parameter

2011-07-31 Thread Torsten Förtsch
Hi, the trunk version of ap_send_fd always passes 0 as offset to apr_brigade_insert_file. Index: server/protocol.c === --- server/protocol.c (revision 1152467) +++ server/protocol.c (working copy) @@ -1380,7 +1380,7 @@ bb

Re: mod_ssl in trunk with OpenSSL 0.9.7 as a minimum requirement?

2011-07-31 Thread Rainer Jung
On 31.07.2011 11:17, Kaspar Brand wrote: > Hi Rainer, > >> There was a similar discussion "RFC: drop support for OpenSSL < 1.0 in >> trunk/2.3?" on this list in May/June 2010. > > Thanks for the pointer! (Too long ago for me to remember, but should > have searched the archives, that's true.) No

Re: mod_ssl in trunk with OpenSSL 0.9.7 as a minimum requirement?

2011-07-31 Thread Kaspar Brand
Hi Rainer, > There was a similar discussion "RFC: drop support for OpenSSL < 1.0 in > trunk/2.3?" on this list in May/June 2010. Thanks for the pointer! (Too long ago for me to remember, but should have searched the archives, that's true.) > - drop support for OpenSSL < 0.9.7a > - drop support f

Re: mod_ssl in trunk with OpenSSL 0.9.7 as a minimum requirement?

2011-07-31 Thread Rainer Jung
Hi Kaspar, On 31.07.2011 09:38, Kaspar Brand wrote: > I'm considering cleaning up some of the cert revocation checking code in > mod_ssl, in particular ssl_callback_SSLVerify_CRL(), which currently has > the following comment: > > * OpenSSL provides the general mechanism to deal with CRLs but do

mod_ssl in trunk with OpenSSL 0.9.7 as a minimum requirement?

2011-07-31 Thread Kaspar Brand
I'm considering cleaning up some of the cert revocation checking code in mod_ssl, in particular ssl_callback_SSLVerify_CRL(), which currently has the following comment: * OpenSSL provides the general mechanism to deal with CRLs but does not * use them automatically when verifying certificates, s