Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:129782 X-Original-To: internals@lists.php.net Delivered-To: internals@lists.php.net Received: from php-smtp4.php.net (php-smtp4.php.net [45.112.84.5]) by lists.php.net (Postfix) with ESMTPS id 1B0DE1A00BC for ; Sun, 18 Jan 2026 14:16:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=php.net; s=mail; t=1768745804; bh=7J13+C2tq9sEciRRCsne+Di7ltcYH+sb/+dmfJ1qx7o=; h=Date:Subject:To:References:From:In-Reply-To:From; b=UUAyEPXejNJRuELpz2GgNDy9MwRstiX1CHzNeLrDiXiQK8CAZI9tVw281aDo36I26 FenKe6TNpmkdjw/cQkECKBZcu3KD0wjlIkNkRbAUVobJoLzE1ixVg8Cy12dAY0Go92 PYDoS1Ynsxy4WxURKJ/lBn0DcKKgfRBr2I5EMIt5Rv1yrOukFoNs3dtMNzspm1w6JG EBebxc5c+6z2ipkm+YGiKSubQEwO5Cd2efWCXTtNIjFySXixlRla5NzF1Alkowh/Ij SZGIxyYJZEUSfb7FI1uy2Ht0g+KZOQ11riCVbLmjSoGQRqU13FXW1L2TD0GYnxJ1C+ YILx10+b32sOQ== Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 1A00C1801C7 for ; Sun, 18 Jan 2026 14:16:44 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 4.0.1 (2024-03-25) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=0.6 required=5.0 tests=BAYES_50,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,DMARC_PASS,SPF_HELO_NONE, SPF_PASS autolearn=no autolearn_force=no version=4.0.1 X-Spam-Virus: No X-Envelope-From: Received: from chrono.xqk7.com (chrono.xqk7.com [176.9.45.72]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Sun, 18 Jan 2026 14:16:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bastelstu.be; s=mail20171119; t=1768745792; bh=3InedMNMy0koIE8IwODHa1O3H3GrJ9fXPftpm7xd+3Y=; h=Message-ID:Date:MIME-Version:Subject:To:References:From: In-Reply-To:Content-Type:from:to:cc:subject:message-id; b=cMm7nCQbDlUV3qp0o4P2pQOxKXBHNXhybhddBKh00NOaJ6tsXPWdE8ragHywD7NbC RPKEf2FFseFSN9IbtGXWA0JYYRJsa0eqBtVimJsun+x20iem3svOiZwHb5YWkedV96 TQNu5e2wO5RdMd6u6i3z8qydD9phunCSRO901lKHYVgWCz0eIhevIiQ+X259aFay1w 5DrQ3siBYXi59Ry+9l50vZZxms8ZM9szcBggTaAYjePa+aD8pUtfWFiCSxJm+01Cju RQQHRw8MpH3CzrGFJrm1a17uI6O96Szg0+Qh1S22Bk0LgzUWJ/8yOzH5FUd2dbE4R9 4WCcndvZidD6g== Message-ID: <2d741c45-9c92-4404-a0d5-02bf26a557b1@bastelstu.be> Date: Sun, 18 Jan 2026 15:16:32 +0100 Precedence: list list-help: list-unsubscribe: list-post: List-Id: x-ms-reactions: disallow MIME-Version: 1.0 Subject: Re: [PHP-DEV] [RFC] TLS Session Resumption Support for Streams To: Jakub Zelenka , PHP internals list References: Content-Language: en-US In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit From: tim@bastelstu.be (=?UTF-8?Q?Tim_D=C3=BCsterhus?=) Hi On 12/23/25 00:07, Jakub Zelenka wrote: > I would like to introduce a TLS Session Resumption Support for Streams RFC > that is part of my stream evolution work (PHP Foundation project funded by > Sovereign Tech Fund) : > > https://wiki.php.net/rfc/tls_session_resumption_api Thank you for the RFC. The feature makes sense to me and fills a clear gap. I'm sharing some of Derick's concerns and questions, particularly: 1. What will happen if an incorrect / outdated / malformed `session_data` string is provided? Will it silently be ignored? Will it emit an error? Will there be issues internally in OpenSSL? 2. We should avoid introducing new E_WARNINGs, particularly for clear error situation (session_get_cb without session_new_cb). Best regards Tim Düsterhus