summaryrefslogtreecommitdiff
path: root/source4/lib/tls
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2006-07-21 01:34:56 +0000
committerGerald (Jerry) Carter <jerry@samba.org>2007-10-10 14:10:15 -0500
commita1a842eb44b5bbb59af445af7a2c4a00e8c0188a (patch)
tree038faa4a98f386f2fd571799842deedefdbf6746 /source4/lib/tls
parentdc2715b49c477adb4ba95149a3bfdf79457fa6c0 (diff)
downloadsamba-a1a842eb44b5bbb59af445af7a2c4a00e8c0188a.tar.gz
samba-a1a842eb44b5bbb59af445af7a2c4a00e8c0188a.tar.bz2
samba-a1a842eb44b5bbb59af445af7a2c4a00e8c0188a.zip
r17168: Now that TLS (and soon SASL) is below the socket layer, we need to
make the testnonblock skip some things. The socket *under* the tls socket is still tested. Andrew Bartlett (This used to be commit 9c33c6a20a77e3f15eac3d62488117517afad940)
Diffstat (limited to 'source4/lib/tls')
-rw-r--r--source4/lib/tls/config.mk2
-rw-r--r--source4/lib/tls/tls.c6
2 files changed, 5 insertions, 3 deletions
diff --git a/source4/lib/tls/config.mk b/source4/lib/tls/config.mk
index 2ab296049b..f75c613e73 100644
--- a/source4/lib/tls/config.mk
+++ b/source4/lib/tls/config.mk
@@ -5,7 +5,7 @@ OBJ_FILES = \
tls.o \
tlscert.o
PUBLIC_DEPENDENCIES = \
- LIBTALLOC GNUTLS LIBSAMBA-CONFIG
+ LIBTALLOC GNUTLS LIBSAMBA-CONFIG samba-socket
#
# End SUBSYSTEM LIBTLS
################################################
diff --git a/source4/lib/tls/tls.c b/source4/lib/tls/tls.c
index 936c18c0c6..1ba8ae9779 100644
--- a/source4/lib/tls/tls.c
+++ b/source4/lib/tls/tls.c
@@ -443,7 +443,8 @@ struct socket_context *tls_init_server(struct tls_params *params,
NTSTATUS nt_status;
nt_status = socket_create_with_ops(socket, &tls_socket_ops, &new_sock,
- SOCKET_TYPE_STREAM, 0);
+ SOCKET_TYPE_STREAM,
+ socket->flags | SOCKET_FLAG_FAKE);
if (!NT_STATUS_IS_OK(nt_status)) {
return NULL;
}
@@ -522,7 +523,8 @@ struct socket_context *tls_init_client(struct socket_context *socket,
NTSTATUS nt_status;
nt_status = socket_create_with_ops(socket, &tls_socket_ops, &new_sock,
- SOCKET_TYPE_STREAM, 0);
+ SOCKET_TYPE_STREAM,
+ socket->flags | SOCKET_FLAG_FAKE);
if (!NT_STATUS_IS_OK(nt_status)) {
return NULL;
}