Skip to content
This repository has been archived by the owner on May 24, 2022. It is now read-only.

SSL error queue fix #130

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

dowski
Copy link

@dowski dowski commented Jan 2, 2013

Errors were not getting cleared from the queue between various OpenSSL
function calls. This was causing the error queue to contain misleading
information on subsequent calls to SSL_get_error.

One degenerate case was incorrect dispatching of errors after a failed
SSL_read. Conditions that simply should have lead to another call to
SSL_read were being treated as fatal. This was verified while stracing a
stud process and seeing read() return with EAGAIN and stud immediately
closing the socket fd and logging an SSL_read error.

Errors were not getting cleared from the queue between various OpenSSL
function calls. This was causing the error queue to contain misleading
information on subsequent calls to SSL_get_error.

One degenerate case was incorrect dispatching of errors after a failed
SSL_read. Conditions that simply should have lead to another call to
SSL_read were being treated as fatal. This was verified while stracing a
stud process and seeing read() return with EAGAIN and stud immediately
closing the socket fd and logging an SSL_read error.
@edevil
Copy link

edevil commented Mar 6, 2013

I think I've been bitten by this bug. Is there a problem with the patch?

#100 is related.

@dowski
Copy link
Author

dowski commented Mar 9, 2013

The patch is good. It's been running in production for a few months now and has solved the problem reported in the description.

mamash pushed a commit to TritonDataCenter/pkgsrc-joyent that referenced this pull request Dec 9, 2013
jsonn pushed a commit to jsonn/pkgsrc that referenced this pull request Feb 20, 2015
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants