@@ -1743,16 +1743,16 @@ proxy_ssl_accept(void *ssl, int fd)
1743
1743
sel_rc = 0 ;
1744
1744
switch (SSL_get_error (ssl , ssl_rc )) {
1745
1745
case SSL_ERROR_WANT_READ :
1746
- log_error ("ssl-accept want-read %s" ,
1746
+ log_trace ("ssl-accept want-read %s" ,
1747
1747
ERR_error_string (ERR_get_error (), NULL ));
1748
1748
pfds .events = POLLIN ;
1749
- sel_rc = poll (& pfds , 1 , 30 );
1749
+ sel_rc = poll (& pfds , 1 , 100 );
1750
1750
break ;
1751
1751
case SSL_ERROR_WANT_WRITE :
1752
- log_error ("ssl-accept want-write %s" ,
1752
+ log_trace ("ssl-accept want-write %s" ,
1753
1753
ERR_error_string (ERR_get_error (), NULL ));
1754
1754
pfds .events = POLLOUT ;
1755
- sel_rc = poll (& pfds , 1 , 30 );
1755
+ sel_rc = poll (& pfds , 1 , 100 );
1756
1756
break ;
1757
1757
default :
1758
1758
log_error ("ssl-accept failed %s" ,
@@ -2031,17 +2031,6 @@ proxy_notifier(int fd, notify_type_t type, void *priv)
2031
2031
2032
2032
new_sd = get_mapped_proxy_fd (new_sd , 1 );
2033
2033
2034
- if (ent -> val .ssl_ctx ) {
2035
- ssl = SSL_new (ent -> val .ssl_ctx );
2036
- assert (ssl );
2037
- SSL_set_fd (ssl , new_sd );
2038
- if (proxy_ssl_accept (ssl , new_sd ) < 0 ) {
2039
- SSL_free (ssl );
2040
- close (new_sd );
2041
- continue ;
2042
- }
2043
- }
2044
-
2045
2034
if (proxy_skmap_key_from_fd (new_sd , & key , & protocol )) {
2046
2035
log_error ("skmap key from fd failed" );
2047
2036
if (ssl ) {
@@ -2054,6 +2043,17 @@ proxy_notifier(int fd, notify_type_t type, void *priv)
2054
2043
2055
2044
proxy_sock_set_opts (new_sd , protocol );
2056
2045
2046
+ if (ent -> val .ssl_ctx ) {
2047
+ ssl = SSL_new (ent -> val .ssl_ctx );
2048
+ assert (ssl );
2049
+ SSL_set_fd (ssl , new_sd );
2050
+ if (proxy_ssl_accept (ssl , new_sd ) < 0 ) {
2051
+ SSL_free (ssl );
2052
+ close (new_sd );
2053
+ continue ;
2054
+ }
2055
+ }
2056
+
2057
2057
proxy_log ("new accept()" , & key );
2058
2058
log_trace ("newfd = %d" , new_sd );
2059
2059
0 commit comments