summaryrefslogtreecommitdiff
path: root/zen/open_ssl.cpp
diff options
context:
space:
mode:
authorDaniel Wilhelm <shieldwed@outlook.com>2020-03-20 22:40:40 +0000
committerDaniel Wilhelm <shieldwed@outlook.com>2020-03-20 22:40:40 +0000
commit7a3869712e5c23b8e5e17ece4cbbf3d5909de5a6 (patch)
treea43b1c04f9947fe02d7d5444354f0176c28ed594 /zen/open_ssl.cpp
parentMerge branch '10.21' into 'master' (diff)
parentadd upstream 10.22 (diff)
downloadFreeFileSync-7a3869712e5c23b8e5e17ece4cbbf3d5909de5a6.tar.gz
FreeFileSync-7a3869712e5c23b8e5e17ece4cbbf3d5909de5a6.tar.bz2
FreeFileSync-7a3869712e5c23b8e5e17ece4cbbf3d5909de5a6.zip
Merge branch '10.22' into 'master'10.22
add upstream 10.22 See merge request opensource-tracking/FreeFileSync!19
Diffstat (limited to 'zen/open_ssl.cpp')
-rw-r--r--zen/open_ssl.cpp17
1 files changed, 12 insertions, 5 deletions
diff --git a/zen/open_ssl.cpp b/zen/open_ssl.cpp
index b823f8ca..0f1da3fc 100644
--- a/zen/open_ssl.cpp
+++ b/zen/open_ssl.cpp
@@ -18,7 +18,7 @@ using namespace zen;
#error FFS, we are royally screwed!
#endif
-static_assert(OPENSSL_VERSION_NUMBER >= 0x10100000L, "OpenSSL version too old");
+static_assert(OPENSSL_VERSION_NUMBER >= 0x1010105fL, "OpenSSL version too old");
void zen::openSslInit()
@@ -68,7 +68,7 @@ std::wstring formatOpenSSLError(const std::wstring& functionName, unsigned long
std::wstring formatLastOpenSSLError(const std::wstring& functionName)
{
- const unsigned long ec = ::ERR_peek_last_error();
+ const auto ec = ::ERR_peek_last_error();
::ERR_clear_error(); //clean up for next OpenSSL operation on this thread
return formatOpenSSLError(functionName, ec);
}
@@ -566,9 +566,16 @@ public:
if (rv != 1)
{
const int sslError = ::SSL_get_error(ssl_, rv);
- if (sslError == SSL_ERROR_ZERO_RETURN || //EOF + close_notify alert
- (sslError == SSL_ERROR_SYSCALL && ::ERR_peek_last_error() == 0)) //EOF: only expected for HTTP/1.0
+ if (sslError == SSL_ERROR_ZERO_RETURN)
+ return 0; //EOF + close_notify alert
+
+ warn_static("find a better solution for SSL_read_ex + EOF")
+ //"sslError == SSL_ERROR_SYSCALL && ::ERR_peek_last_error() == 0" => obsolete as of OpenSSL 1.1.1e
+ //https://github.com/openssl/openssl/issues/10880#issuecomment-575746226
+ const auto ec = ::ERR_peek_last_error();
+ if (sslError == SSL_ERROR_SSL && ERR_GET_REASON(ec) == SSL_R_UNEXPECTED_EOF_WHILE_READING) //EOF: only expected for HTTP/1.0
return 0;
+
throw SysError(formatLastOpenSSLError(L"SSL_read_ex") + L' ' + formatSslErrorCode(sslError));
}
assert(bytesReceived > 0); //SSL_read_ex() considers EOF an error!
@@ -764,7 +771,7 @@ std::string zen::convertPuttyKeyToPkix(const std::string& keyStream, const std::
auto numToBeString = [](size_t n) -> std::string
{
- static_assert(usingLittleEndian() && sizeof(n) >= 4);
+ static_assert(usingLittleEndian()&& sizeof(n) >= 4);
const char* numStr = reinterpret_cast<const char*>(&n);
return { numStr[3], numStr[2], numStr[1], numStr[0] }; //big endian!
};
bgstack15