summaryrefslogtreecommitdiffstats
path: root/Modules/_ssl.c
diff options
context:
space:
mode:
authorAntoine Pitrou <solipsis@pitrou.net>2015-03-04 19:51:55 (GMT)
committerAntoine Pitrou <solipsis@pitrou.net>2015-03-04 19:51:55 (GMT)
commitf7f3b0a14a63ca355097fa2ee546d20888e39faa (patch)
tree08d835131d66ba5667ab146032accdc731db69f6 /Modules/_ssl.c
parent7beb4f96dc9ac3facd2a31912730b128426892b5 (diff)
downloadcpython-f7f3b0a14a63ca355097fa2ee546d20888e39faa.zip
cpython-f7f3b0a14a63ca355097fa2ee546d20888e39faa.tar.gz
cpython-f7f3b0a14a63ca355097fa2ee546d20888e39faa.tar.bz2
Issue #23576: Avoid stalling in SSL reads when EOF has been reached in the SSL layer but the underlying connection hasn't been closed.
Diffstat (limited to 'Modules/_ssl.c')
-rw-r--r--Modules/_ssl.c20
1 files changed, 0 insertions, 20 deletions
diff --git a/Modules/_ssl.c b/Modules/_ssl.c
index 9539710..e7ba583 100644
--- a/Modules/_ssl.c
+++ b/Modules/_ssl.c
@@ -1717,26 +1717,6 @@ static PyObject *PySSL_SSLread(PySSLSocket *self, PyObject *args)
BIO_set_nbio(SSL_get_rbio(self->ssl), nonblocking);
BIO_set_nbio(SSL_get_wbio(self->ssl), nonblocking);
- /* first check if there are bytes ready to be read */
- PySSL_BEGIN_ALLOW_THREADS
- count = SSL_pending(self->ssl);
- PySSL_END_ALLOW_THREADS
-
- if (!count) {
- sockstate = check_socket_and_wait_for_timeout(sock, 0);
- if (sockstate == SOCKET_HAS_TIMED_OUT) {
- PyErr_SetString(PySocketModule.timeout_error,
- "The read operation timed out");
- goto error;
- } else if (sockstate == SOCKET_TOO_LARGE_FOR_SELECT) {
- PyErr_SetString(PySSLErrorObject,
- "Underlying socket too large for select().");
- goto error;
- } else if (sockstate == SOCKET_HAS_BEEN_CLOSED) {
- count = 0;
- goto done;
- }
- }
do {
PySSL_BEGIN_ALLOW_THREADS
count = SSL_read(self->ssl, mem, len);