Blame SOURCES/0048-curl-7.29.0-eb84412b.patch

a2d4e1
From 9a84abe8bd4951f8674e172acf1335d3be961d73 Mon Sep 17 00:00:00 2001
a2d4e1
From: Martin Frodl <mfrodl@redhat.com>
a2d4e1
Date: Mon, 24 Oct 2016 17:44:45 +0200
a2d4e1
Subject: [PATCH] nss: fix tight loop in non-blocking TLS handhsake over proxy
a2d4e1
a2d4e1
... in case the handshake completes before entering
a2d4e1
CURLM_STATE_PROTOCONNECT
a2d4e1
a2d4e1
Bug: https://bugzilla.redhat.com/1388162
a2d4e1
a2d4e1
Upstream-commit: eb84412b33aa9cbe109d3e2874f9dbba48043263
a2d4e1
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
a2d4e1
---
a2d4e1
 lib/nss.c | 5 ++++-
a2d4e1
 1 file changed, 4 insertions(+), 1 deletion(-)
a2d4e1
a2d4e1
diff --git a/lib/nss.c b/lib/nss.c
a2d4e1
index 36c100d..848ce86 100644
a2d4e1
--- a/lib/nss.c
a2d4e1
+++ b/lib/nss.c
a2d4e1
@@ -1603,8 +1603,11 @@ static CURLcode nss_connect_common(struct connectdata *conn, int sockindex,
a2d4e1
   const bool blocking = (done == NULL);
a2d4e1
   CURLcode rv;
a2d4e1
 
a2d4e1
-  if(connssl->state == ssl_connection_complete)
a2d4e1
+  if(connssl->state == ssl_connection_complete) {
a2d4e1
+    if(!blocking)
a2d4e1
+      *done = TRUE;
a2d4e1
     return CURLE_OK;
a2d4e1
+  }
a2d4e1
 
a2d4e1
   if(connssl->connecting_state == ssl_connect_1) {
a2d4e1
     rv = nss_setup_connect(conn, sockindex);
a2d4e1
-- 
a2d4e1
2.7.4
a2d4e1