diff options
author | Antoine Pitrou <solipsis@pitrou.net> | 2015-03-04 19:51:55 (GMT) |
---|---|---|
committer | Antoine Pitrou <solipsis@pitrou.net> | 2015-03-04 19:51:55 (GMT) |
commit | f7f3b0a14a63ca355097fa2ee546d20888e39faa (patch) | |
tree | 08d835131d66ba5667ab146032accdc731db69f6 /Modules | |
parent | 7beb4f96dc9ac3facd2a31912730b128426892b5 (diff) | |
download | cpython-f7f3b0a14a63ca355097fa2ee546d20888e39faa.zip cpython-f7f3b0a14a63ca355097fa2ee546d20888e39faa.tar.gz cpython-f7f3b0a14a63ca355097fa2ee546d20888e39faa.tar.bz2 |
Issue #23576: Avoid stalling in SSL reads when EOF has been reached in the SSL layer but the underlying connection hasn't been closed.
Diffstat (limited to 'Modules')
-rw-r--r-- | Modules/_ssl.c | 20 |
1 files changed, 0 insertions, 20 deletions
diff --git a/Modules/_ssl.c b/Modules/_ssl.c index 9539710..e7ba583 100644 --- a/Modules/_ssl.c +++ b/Modules/_ssl.c @@ -1717,26 +1717,6 @@ static PyObject *PySSL_SSLread(PySSLSocket *self, PyObject *args) BIO_set_nbio(SSL_get_rbio(self->ssl), nonblocking); BIO_set_nbio(SSL_get_wbio(self->ssl), nonblocking); - /* first check if there are bytes ready to be read */ - PySSL_BEGIN_ALLOW_THREADS - count = SSL_pending(self->ssl); - PySSL_END_ALLOW_THREADS - - if (!count) { - sockstate = check_socket_and_wait_for_timeout(sock, 0); - if (sockstate == SOCKET_HAS_TIMED_OUT) { - PyErr_SetString(PySocketModule.timeout_error, - "The read operation timed out"); - goto error; - } else if (sockstate == SOCKET_TOO_LARGE_FOR_SELECT) { - PyErr_SetString(PySSLErrorObject, - "Underlying socket too large for select()."); - goto error; - } else if (sockstate == SOCKET_HAS_BEEN_CLOSED) { - count = 0; - goto done; - } - } do { PySSL_BEGIN_ALLOW_THREADS count = SSL_read(self->ssl, mem, len); |