*) mod_ssl: Fix segfaults after renegotiation failure. PR 21370
[Hartmut Keil <Hartmut.Keil@adnovum.ch>]
Reviewed by: Jeff Trawick, Joe Orton, Sander Striker
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/APACHE_2_0_BRANCH@101332
13f79535-47bb-0310-9956-
ffa450edef68
Changes with Apache 2.0.48
+ *) mod_ssl: Fix segfaults after renegotiation failure. PR 21370
+ [Hartmut Keil <Hartmut.Keil@adnovum.ch>]
+
*) mod_autoindex: If a directory contains a file listed in the
DirectoryIndex directive, the folder icon is no longer replaced
by the icon of that file. PR 9587.
APACHE 2.0 STATUS: -*-text-*-
-Last modified at [$Date: 2003/09/27 18:34:56 $]
+Last modified at [$Date: 2003/09/27 18:47:05 $]
Release:
nd replies: Sure. 1.53 fixes that.
+1: fielding, nd, jerenkrantz, erikabele
- * mod_ssl: Fix segfaults after renegotiation failure. PR 21370
- modules/ssl/ssl_engine_io.c: r1.110
- modules/ssl/ssl_engine_kernel.c: r1.196
- +1: trawick, jorton, striker
-
* More ab fixes; r1.129 fixes what looks like a trivial error in the
SSL support; r1.130 adds some state-handling fixes related to
ab's breakage in 2.0.47
apr_size_t len)
{
ssl_filter_ctx_t *filter_ctx = f->ctx;
- bio_filter_out_ctx_t *outctx =
- (bio_filter_out_ctx_t *)(filter_ctx->pbioWrite->ptr);
+ bio_filter_out_ctx_t *outctx;
int res;
/* write SSL */
return APR_EGENERAL;
}
+ outctx = (bio_filter_out_ctx_t *)filter_ctx->pbioWrite->ptr;
res = SSL_write(filter_ctx->pssl, (unsigned char *)data, len);
if (res < 0) {
sslconn->ssl = NULL;
filter_ctx->pssl = NULL; /* so filters know we've been shutdown */
+ if (abortive) {
+ /* prevent any further I/O */
+ c->aborted = 1;
+ }
+
return APR_SUCCESS;
}
{
apr_status_t status = APR_SUCCESS;
ssl_filter_ctx_t *filter_ctx = f->ctx;
- bio_filter_in_ctx_t *inctx = (bio_filter_in_ctx_t *)
- (filter_ctx->pbioRead->ptr);
+ bio_filter_in_ctx_t *inctx;
if (f->c->aborted) {
apr_brigade_cleanup(bb);
return ap_pass_brigade(f->next, bb);
}
+ inctx = (bio_filter_in_ctx_t *)filter_ctx->pbioRead->ptr;
/* When we are the writer, we must initialize the inctx
* mode so that we block for any required ssl input, because
* output filtering is always nonblocking.
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"Re-negotiation request failed");
+ r->connection->aborted = 1;
return HTTP_FORBIDDEN;
}
"Re-negotiation handshake failed: "
"Not accepted by client!?");
+ r->connection->aborted = 1;
return HTTP_FORBIDDEN;
}
}