Message101455
The intuitive explanation seems to be:
- there are some bytes available for reading on the *TCP socket*, therefore asyncore calls the read handler
- however, there are not enough bytes for OpenSSL to actually decrypt any data, which is why we get SSL_ERROR_WANT_READ when trying to read from the *SSL socket*
The following patch seems to fix test_ftplib; any thoughts?
Index: Lib/test/test_ftplib.py
===================================================================
--- Lib/test/test_ftplib.py (révision 79224)
+++ Lib/test/test_ftplib.py (copie de travail)
@@ -293,7 +293,9 @@
try:
return super(SSLConnection, self).send(data)
except ssl.SSLError, err:
- if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN):
+ if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN,
+ ssl.SSL_ERROR_WANT_READ,
+ ssl.SSL_ERROR_WANT_WRITE):
return 0
raise
@@ -301,6 +303,9 @@
try:
return super(SSLConnection, self).recv(buffer_size)
except ssl.SSLError, err:
+ if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
+ ssl.SSL_ERROR_WANT_WRITE):
+ return ''
if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN):
self.handle_close()
return '' |
|
Date |
User |
Action |
Args |
2010-03-21 20:49:42 | pitrou | set | recipients:
+ pitrou, barry, rhettinger, josiahcarlson, exarkun, amaury.forgeotdarc, janssen, giampaolo.rodola, josiah.carlson, ddvoinikov, srid, qwavel, jimsmyth |
2010-03-21 20:49:42 | pitrou | set | messageid: <1269204582.55.0.442012336344.issue3890@psf.upfronthosting.co.za> |
2010-03-21 20:49:37 | pitrou | link | issue3890 messages |
2010-03-21 20:49:37 | pitrou | create | |
|