[...]
> From that point, the only logical conclusion that can be drawn is that
> select() is for non-blocking I/O only.
[...]
Ouahhh, it looks to me as an over-simplistic conclusion !
select() was not designed and written with future TLS state machine
implementation in mind.
But maybe I shoud
On 10/9/2017 7:49 AM, Jakob Bohm wrote:
On 09/10/2017 16:43, Thomas J. Hruska wrote:
On 10/9/2017 7:29 AM, Jakob Bohm wrote:
I suggest you find a good authoritative source for your claim
that select() should not be used with blocking sockets.
http://man7.org/linux/man-pages/man2/select.2.html
Hi Thomas,
As mentioned previously, I do NOT "want to block" or "hack" with OpenSSL
state machine.
And again, I agree with you that non-blocking socket programming is best and
more flexible.
I just wanted to understand your point and it is now clear for me since I
read the BUGS section of http:/
On 09/10/2017 16:43, Thomas J. Hruska wrote:
On 10/9/2017 7:29 AM, Jakob Bohm wrote:
I suggest you find a good authoritative source for your claim
that select() should not be used with blocking sockets.
http://man7.org/linux/man-pages/man2/select.2.html
Section BUGS:
"Under Linux, select() m
On 10/9/2017 7:29 AM, Jakob Bohm wrote:
I suggest you find a good authoritative source for your claim
that select() should not be used with blocking sockets.
http://man7.org/linux/man-pages/man2/select.2.html
Section BUGS:
"Under Linux, select() may report a socket file descriptor as "ready f
On 09/10/2017 15:31, Thomas J. Hruska wrote:
On 10/9/2017 1:32 AM, Michel wrote:
With blocking sockets, you just loop back around and repeat the same
call
if either of those messages are returned by SSL_get_error(). No select()
required.
Yes, you have to repeat the same call, but select() is s
On 10/9/2017 1:32 AM, Michel wrote:
With blocking sockets, you just loop back around and repeat the same call
if either of those messages are returned by SSL_get_error(). No select()
required.
Yes, you have to repeat the same call, but select() is still usefull,
especially with blocking sockets
Hi,
Thanks for the comment.
I know that openSSL is not 186-4 compliant. That is why I am looking
for anybody have the patch for the same.
I see there are some works in Fedora:
http://pkgs.fedoraproject.org/cgit/rpms/openssl.git/tree/openssl-1.1.0-fips.patch
Thanks,
Murugesh P.
On 10/6/17, Salz
> With blocking sockets, you just loop back around and repeat the same call
if either of those messages are returned by SSL_get_error(). No select()
required.
Yes, you have to repeat the same call, but select() is still usefull,
especially with blocking sockets.
Regards,
Michel.
--
openssl-use