Eneas U de Queiroz eea3a9625c openssl: revert EOF detection change in 1.1.1
This adds patches to avoid possible application breakage caused by a
change in behavior introduced in 1.1.1e.  It affects at least nginx,
which logs error messages such as:
nginx[16652]: [crit] 16675#0: *358 SSL_read() failed (SSL: error:
4095126:SSL routines:ssl3_read_n:unexpected eof while reading) while
keepalive, client: xxxx, server: [::]:443

Openssl commits db943f4 (Detect EOF while reading in libssl), and
22623e0 (Teach more BIOs how to handle BIO_CTRL_EOF) changed the
behavior when encountering an EOF in SSL_read().  Previous behavior was
to return SSL_ERROR_SYSCALL, but errno would still be 0.  The commits
being reverted changed it to SSL_ERRO_SSL, and add an error to the
stack, which is correct.  Unfortunately this affects a number of
applications that counted on the old behavior, including nginx.

The reversion was discussed in openssl/openssl#11378, and implemented as
PR openssl/openssl#11400.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
(cherry picked from commit 2e8a4db9b6b942e3180afda0dc0fd8ac506527f1)
2020-03-29 18:46:51 +02:00
..
2019-09-04 13:42:02 +02:00
2019-01-24 10:39:30 +01:00
2019-05-17 21:41:43 +02:00
2019-11-01 14:22:37 +00:00
2019-01-24 10:39:30 +01:00
2019-09-04 13:46:01 +02:00
2019-01-24 10:39:30 +01:00
2019-10-19 14:30:05 +02:00
2019-01-24 10:39:30 +01:00
2019-01-24 10:39:30 +01:00
2020-01-26 19:23:40 +01:00
2019-09-04 13:37:38 +02:00
2019-09-04 13:41:40 +02:00
2019-02-26 23:20:04 +01:00
2019-10-19 14:30:00 +02:00
2020-01-04 23:04:24 +01:00