On Mon, Mar 19, 2001 at 01:54:46PM -0500, ackka ackka wrote:

> [...]  When looking into this more I found that the infinite loop is caused
> on a SSL_peek call.

Please try the beta for OpenSSL 0.9.6a (available from ftp.openssl.org
or one of the mirrors, http://www.openssl.org/source/mirror.html) and
report if it solves your problem.  SSL_peek is known to be broken in
versions up to OpenSSL 0.9.6.

However note that in any case SSL_peek will actually read data from
the underlying socket if it can, just like SSL_read.  The difference
between SSL_read and SSL_peek is that the latter will keep decrypted
application data around for later SSL_read (or SSL_peek) requests.
If your goal is to avoid blocking, you have to use non-blocking sockets.


-- 
Bodo Möller <[EMAIL PROTECTED]>
PGP http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/0x36d2c658.html
* TU Darmstadt, Theoretische Informatik, Alexanderstr. 10, D-64283 Darmstadt
* Tel. +49-6151-16-6628, Fax +49-6151-16-6036
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to