Hello,

> Sorry, I believe you are mistaken, you are proposing to fix poorly
> written non-blocking applications by breaking correctly written blocking
> applications. This is not acceptable. 
When you use blocking socket now, you must react on SSL_ERROR_WANT*
any many more - if not - you are doing mistake.
Good written application must react on this errors - sooner or later
in development process.
My proposition was to add to one of this error situation when SSL_read()
is doing renegotiation. Look at SSL dump.

In what way this break already used applications ???
In what way this break anything ??? 

Best regards,
-- 
Marek Marcola <[EMAIL PROTECTED]>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to