63ca9e3
From c7bd0361565f70caf621f588e38bfc6cc196c432 Mon Sep 17 00:00:00 2001
63ca9e3
From: Kamil Dudka <kdudka@redhat.com>
63ca9e3
Date: Tue, 5 Mar 2013 17:51:01 +0100
63ca9e3
Subject: [PATCH 1/2] nss: fix misplaced code enabling non-blocking socket mode
63ca9e3
63ca9e3
The option needs to be set on the SSL socket.  Setting it on the model
63ca9e3
takes no effect.  Note that the non-blocking mode is still not enabled
63ca9e3
for the handshake because the code is not yet ready for that.
63ca9e3
63ca9e3
[upstream commit 9d0af3018c5db25f5adda216dbcad6056b4a3107]
63ca9e3
---
63ca9e3
 lib/nss.c |   12 ++++++------
63ca9e3
 1 files changed, 6 insertions(+), 6 deletions(-)
63ca9e3
63ca9e3
diff --git a/lib/nss.c b/lib/nss.c
63ca9e3
index efa578c..0ad1863 100644
63ca9e3
--- a/lib/nss.c
63ca9e3
+++ b/lib/nss.c
63ca9e3
@@ -1240,12 +1240,6 @@ CURLcode Curl_nss_connect(struct connectdata *conn, int sockindex)
63ca9e3
     goto error;
63ca9e3
   model = SSL_ImportFD(NULL, model);
63ca9e3
 
63ca9e3
-  /* make the socket nonblocking */
63ca9e3
-  sock_opt.option = PR_SockOpt_Nonblocking;
63ca9e3
-  sock_opt.value.non_blocking = PR_TRUE;
63ca9e3
-  if(PR_SetSocketOption(model, &sock_opt) != PR_SUCCESS)
63ca9e3
-    goto error;
63ca9e3
-
63ca9e3
   if(SSL_OptionSet(model, SSL_SECURITY, PR_TRUE) != SECSuccess)
63ca9e3
     goto error;
63ca9e3
   if(SSL_OptionSet(model, SSL_HANDSHAKE_AS_SERVER, PR_FALSE) != SECSuccess)
63ca9e3
@@ -1420,6 +1414,12 @@ CURLcode Curl_nss_connect(struct connectdata *conn, int sockindex)
63ca9e3
     goto error;
63ca9e3
   }
63ca9e3
 
63ca9e3
+  /* switch the SSL socket into non-blocking mode */
63ca9e3
+  sock_opt.option = PR_SockOpt_Nonblocking;
63ca9e3
+  sock_opt.value.non_blocking = PR_TRUE;
63ca9e3
+  if(PR_SetSocketOption(connssl->handle, &sock_opt) != PR_SUCCESS)
63ca9e3
+    goto error;
63ca9e3
+
63ca9e3
   connssl->state = ssl_connection_complete;
63ca9e3
   conn->recv[sockindex] = nss_recv;
63ca9e3
   conn->send[sockindex] = nss_send;
63ca9e3
-- 
63ca9e3
1.7.1
63ca9e3
63ca9e3
63ca9e3
From f3a5d46280264965ca096c9b3efba481d4883d0e Mon Sep 17 00:00:00 2001
63ca9e3
From: Daniel Stenberg <daniel@haxx.se>
63ca9e3
Date: Tue, 7 May 2013 23:30:52 +0200
63ca9e3
Subject: [PATCH 2/2] nss: give PR_INTERVAL_NO_WAIT instead of -1 to PR_Recv/PR_Send
63ca9e3
63ca9e3
Reported by: David Strauss
63ca9e3
Bug: http://curl.haxx.se/mail/lib-2013-05/0088.html
63ca9e3
63ca9e3
[upstream commit 01a2abedd7e3a2075de70979003302313570c58c]
63ca9e3
63ca9e3
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
63ca9e3
---
63ca9e3
 lib/nss.c |   11 ++++-------
63ca9e3
 1 files changed, 4 insertions(+), 7 deletions(-)
63ca9e3
63ca9e3
diff --git a/lib/nss.c b/lib/nss.c
63ca9e3
index 0ad1863..f69a888 100644
63ca9e3
--- a/lib/nss.c
63ca9e3
+++ b/lib/nss.c
63ca9e3
@@ -1487,10 +1487,8 @@ static ssize_t nss_send(struct connectdata *conn,  /* connection data */
63ca9e3
                         size_t len,                /* amount to write */
63ca9e3
                         CURLcode *curlcode)
63ca9e3
 {
63ca9e3
-  int rc;
63ca9e3
-
63ca9e3
-  rc = PR_Send(conn->ssl[sockindex].handle, mem, (int)len, 0, -1);
63ca9e3
-
63ca9e3
+  ssize_t rc = PR_Send(conn->ssl[sockindex].handle, mem, (int)len, 0,
63ca9e3
+                       PR_INTERVAL_NO_WAIT);
63ca9e3
   if(rc < 0) {
63ca9e3
     PRInt32 err = PR_GetError();
63ca9e3
     if(err == PR_WOULD_BLOCK_ERROR)
63ca9e3
@@ -1518,9 +1516,8 @@ static ssize_t nss_recv(struct connectdata * conn, /* connection data */
63ca9e3
                         size_t buffersize,         /* max amount to read */
63ca9e3
                         CURLcode *curlcode)
63ca9e3
 {
63ca9e3
-  ssize_t nread;
63ca9e3
-
63ca9e3
-  nread = PR_Recv(conn->ssl[num].handle, buf, (int)buffersize, 0, -1);
63ca9e3
+  ssize_t nread = PR_Recv(conn->ssl[num].handle, buf, (int)buffersize, 0,
63ca9e3
+                          PR_INTERVAL_NO_WAIT);
63ca9e3
   if(nread < 0) {
63ca9e3
     /* failed SSL read */
63ca9e3
     PRInt32 err = PR_GetError();
63ca9e3
-- 
63ca9e3
1.7.1
63ca9e3