summaryrefslogtreecommitdiff
path: root/lib/sendf.c
diff options
context:
space:
mode:
authorDaniel Stenberg <daniel@haxx.se>2002-12-19 15:45:15 +0000
committerDaniel Stenberg <daniel@haxx.se>2002-12-19 15:45:15 +0000
commit39dc14c0025fe942efcd4a7b903443fa0c9ae4a0 (patch)
tree2d102ba230c7d900a1159819ea7a71b5d2797003 /lib/sendf.c
parent04c499a5fc1d9120628737baa6565a6eb20a70fa (diff)
downloadcurl-39dc14c0025fe942efcd4a7b903443fa0c9ae4a0.tar.gz
Fixed the usage of SSL_read() to properly return -1 if the EWOULDBLOCK
situation occurs, which it previously didn't! This was reptoed by Evan Jordan in bug report #653022. Also, if ERROR_SYSCALL is returned from SSL_write(), include the errno number in the error string for easier error detection.
Diffstat (limited to 'lib/sendf.c')
-rw-r--r--lib/sendf.c24
1 files changed, 11 insertions, 13 deletions
diff --git a/lib/sendf.c b/lib/sendf.c
index 77c4cf333..ed36ea95d 100644
--- a/lib/sendf.c
+++ b/lib/sendf.c
@@ -235,6 +235,9 @@ CURLcode Curl_write(struct connectdata *conn, int sockfd,
/* this is basicly the EWOULDBLOCK equivalent */
*written = 0;
return CURLE_OK;
+ case SSL_ERROR_SYSCALL:
+ failf(conn->data, "SSL_write() returned SYSCALL, errno = %d\n", errno);
+ return CURLE_SEND_ERROR;
}
/* a true error */
failf(conn->data, "SSL_write() return error %d\n", err);
@@ -328,36 +331,31 @@ int Curl_read(struct connectdata *conn,
ssize_t *n)
{
ssize_t nread;
+ *n=0; /* reset amount to zero */
#ifdef USE_SSLEAY
if (conn->ssl.use) {
- bool loop=TRUE;
- int err;
- do {
- nread = SSL_read(conn->ssl.handle, buf, buffersize);
-
- if(nread >= 0)
- /* successful read */
- break;
+ nread = SSL_read(conn->ssl.handle, buf, buffersize);
- err = SSL_get_error(conn->ssl.handle, nread);
+ if(nread < 0) {
+ /* failed SSL_read */
+ int err = SSL_get_error(conn->ssl.handle, nread);
switch(err) {
case SSL_ERROR_NONE: /* this is not an error */
case SSL_ERROR_ZERO_RETURN: /* no more data */
- loop=0; /* get out of loop */
break;
case SSL_ERROR_WANT_READ:
case SSL_ERROR_WANT_WRITE:
/* if there's data pending, then we re-invoke SSL_read() */
+ if(SSL_pending(conn->ssl.handle))
+ return -1; /* basicly EWOULDBLOCK */
break;
default:
failf(conn->data, "SSL read error: %d", err);
return CURLE_RECV_ERROR;
}
- } while(loop);
- if(loop && SSL_pending(conn->ssl.handle))
- return -1; /* basicly EWOULDBLOCK */
+ }
}
else {
#endif