THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
A new Flyspray task has been opened. Details are below.
User who did this - Anonymous user ()
Attached to Project - sip-router
Summary - TLS modul problem
Task Type - Bug Report
Category - tls
Status - Assigned
Assigned To - Andrei Pelinescu-Onciul
Operating System - Linux
Severity - Critical
Priority - Normal
Reported Version - Development
Due in Version - Undecided
Due Date - Undecided
Details - I am experiencing problem "Invalid connection state (bug in TCP
code)"in tls_server.c in function
<code>
static int tls_complete_init(struct tcp_connection* c)
</code>
<code>
if (c->state == S_CONN_ACCEPT) {
dom = tls_lookup_cfg(cfg, TLS_DOMAIN_SRV, &c->rcv.dst_ip,
c->rcv.dst_port);
} else if (c->state == S_CONN_CONNECT) {
dom = tls_lookup_cfg(cfg, TLS_DOMAIN_CLI, &c->rcv.dst_ip,
c->rcv.dst_port);
} else {
BUG("Invalid connection state (bug in TCP code)\n");
goto error;
}
</code>
Incoming tls connection is working fine. The problem only occurs if a worker received a
new invite and want forward and open a new TLS connection by
<code>int tls_h_blocking_write(struct tcp_connection *c, int fd, const char *buf,
unsigned int len)
</code>
I am debugged with gdb and i catch that c->state is S_CONN_OK
So it seems it TCP is already connected.
My TCP config in ser.cfg
<code>
#TLS
enable_tls=yes
#TCP settings
disable_tcp=no
tcp_async=no
tcp_send_timeout=2
#tcp_accept_aliases=yes # accepts the tcp alias via option (see NEWS)
tcp_delayed_ack=no
tcp_fd_cache=no
</code>
More information can be found at the following URL:
http://sip-router.org/tracker/index.php?do=details&task_id=14
You are receiving this message because you have requested it from the Flyspray bugtracking
system. If you did not expect this message or don't want to receive mails in future,
you can change your notification settings at the URL shown above.