>               for (nread = 0; nread < sizeof(buf); nread += err)
>               {
>                       err = SSL_read(client_conn, buf + nread,
> sizeof(buf) - nread);
>                       if (err <= 0)
>                               break;
>               }

Umm, this doesn't look like an HTTP protocol implementation. This looks like
code to read 1,024 bytes. Who says an HTTP request is exactly 1,024 bytes?


>                       for ( nwrite = 0; nwrite <= strlen(buf) ; )
>                       {
>
>                               werr =
> SSL_write(client_conn,buf,strlen(buf));
>                               printf ("Loop = %d", i++);
>                                       if (werr <= 0 )
>                                       {
>                                               printf ("Write Error \n");
>                                               continue;
>                                       }
>                                       nwrite += werr;
>                       }

This doesn't write all the data. It keeps writing the beginning of the data
as many times as needed to send a number of bytes equal to the total length
of the data. That doesn't seem to make much sense.

DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to