On Mon, Mar 19, 2001 at 01:54:46PM -0500, ackka ackka wrote:
> [...] When looking into this more I found that the infinite loop is caused
> on a SSL_peek call.
Please try the beta for OpenSSL 0.9.6a (available from ftp.openssl.org
or one of the mirrors, http://www.openssl.org/source/mirror.html) and
report if it solves your problem. SSL_peek is known to be broken in
versions up to OpenSSL 0.9.6.
However note that in any case SSL_peek will actually read data from
the underlying socket if it can, just like SSL_read. The difference
between SSL_read and SSL_peek is that the latter will keep decrypted
application data around for later SSL_read (or SSL_peek) requests.
If your goal is to avoid blocking, you have to use non-blocking sockets.
--
Bodo Möller <[EMAIL PROTECTED]>
PGP http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/0x36d2c658.html
* TU Darmstadt, Theoretische Informatik, Alexanderstr. 10, D-64283 Darmstadt
* Tel. +49-6151-16-6628, Fax +49-6151-16-6036
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]