summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authornormal <normal@ruby-lang.org>2015-06-24 17:44:01 +0000
committernormal <normal@ruby-lang.org>2015-06-24 17:44:01 +0000
commitb803e59f42c3e8b0af67bf440cff812078124380 (patch)
treeee739766354d4c6db45d2c759686223f44cb9b17
parent0cc65a31425191c7da0b6f4a42d1fb81d733f7f6 (diff)
downloadruby-openssl-history-b803e59f42c3e8b0af67bf440cff812078124380.tar.gz
ext/openssl/ossl_ssl.c: raise if kwargs given in blocking mode
OpenSSL::SSL::SSLSocket#sysread does not accept kwargs in blocking mode, inform users if they make an error. * ext/openssl/ossl_ssl.c (ossl_ssl_read_internal): do not process kwargs in blocking mode * test/openssl/test_ssl.rb: test sysread git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@51016 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
-rw-r--r--ext/openssl/ossl_ssl.c10
-rw-r--r--test/test_ssl.rb14
2 files changed, 21 insertions, 3 deletions
diff --git a/ext/openssl/ossl_ssl.c b/ext/openssl/ossl_ssl.c
index ce8ce89..4496d46 100644
--- a/ext/openssl/ossl_ssl.c
+++ b/ext/openssl/ossl_ssl.c
@@ -1430,13 +1430,17 @@ ossl_ssl_read_internal(int argc, VALUE *argv, VALUE self, int nonblock)
{
SSL *ssl;
int ilen, nread = 0;
- int no_exception;
+ int no_exception = 0;
VALUE len, str;
rb_io_t *fptr;
VALUE opts = Qnil;
- rb_scan_args(argc, argv, "11:", &len, &str, &opts);
- no_exception = get_no_exception(opts);
+ if (nonblock) {
+ rb_scan_args(argc, argv, "11:", &len, &str, &opts);
+ no_exception = get_no_exception(opts);
+ } else {
+ rb_scan_args(argc, argv, "11", &len, &str);
+ }
ilen = NUM2INT(len);
if(NIL_P(str)) str = rb_str_new(0, ilen);
diff --git a/test/test_ssl.rb b/test/test_ssl.rb
index 3ffddf8..f2a64ca 100644
--- a/test/test_ssl.rb
+++ b/test/test_ssl.rb
@@ -60,6 +60,20 @@ class OpenSSL::TestSSL < OpenSSL::SSLTestCase
}
end
+ def test_ssl_sysread_blocking_error
+ start_server(OpenSSL::SSL::VERIFY_NONE, true) { |server, port|
+ server_connect(port) { |ssl|
+ ssl.write("abc\n")
+ assert_raise(TypeError) { ssl.sysread(4, exception: false) }
+ buf = ''
+ assert_raise(ArgumentError) { ssl.sysread(4, buf, exception: false) }
+ assert_equal '', buf
+ assert_equal buf.object_id, ssl.sysread(4, buf).object_id
+ assert_equal "abc\n", buf
+ }
+ }
+ end
+
def test_connect_and_close
start_server(OpenSSL::SSL::VERIFY_NONE, true){|server, port|
sock = TCPSocket.new("127.0.0.1", port)