> That'd do it. But if you're doing the loop in that sequence, and > if you have > set non-blocking on the sockets, then instead of polling for the > connection > you can use select or poll (depending on your platform) to wait > for incoming > connection activity, then enter ssl_accept in blocking mode which would > probably cut down on those fake errors. Wouldn't this be a better > sequence?
Eww, no. Suppose the connection is aborted before you manage to call SSL_accept. The call could block indefinitely. It is almost always a mistake to use 'select' or 'poll' with blocking socket operations. DS ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]