Summary: | benchmarks/httperf: application receive buffer too small in case of TLS | ||
---|---|---|---|
Product: | Ports & Packages | Reporter: | szander |
Component: | Individual Port(s) | Assignee: | Julien Laffaye <jlaffaye> |
Status: | Closed FIXED | ||
Severity: | Affects Only Me | CC: | danfe, w.schwarzenfeld |
Priority: | --- | Flags: | bugzilla:
maintainer-feedback?
(jlaffaye) |
Version: | Latest | ||
Hardware: | Any | ||
OS: | Any |
Description
szander
2018-08-16 23:23:43 UTC
Maintainer feedback! A commit references this bug: Author: danfe Date: Sat Dec 7 11:39:36 UTC 2019 New revision: 519200 URL: https://svnweb.freebsd.org/changeset/ports/519200 Log: - Update to the latest GitHub commit: current version is from 2015 and is not compatible with modern OpenSSL implementations - Set PORTVERSION to the version number as reported by `httperf -V' - Increase buffer size in do_recv() to match TLS record size which can be up to 16kB [1] - When using TLS 1.1 or TLS 1.2, the first SSL_connect() may often return error, while subsequent requests work fine -- to mitigate this, try to SSL_connect() a little harder [2] Approved by: maintainer timeout PR: 230680 [1], 230681 [2] Changes: head/benchmarks/httperf/Makefile head/benchmarks/httperf/distinfo head/benchmarks/httperf/files/patch-nossl23 head/benchmarks/httperf/files/patch-src_core.c Should be fixed per ports r519200, thanks! |