William A. Rowe Jr. [mailto:[email protected]], 2012年3月17日 9:32
> Ok folks, here's what we know; on some platforms the blocking
behavior is not being honored and SSL is terminated due to the "client's
failure"
> to provide enough bytes in time. In fact it is the fault of apr plus
the socket stack for not returning without more bytes.
>
> That said, I neglected the fact that the following functions replace
the passed variable with the old value, "un-zeroing" the value of zero!
>
> Please give this patch a whirl and let us know what you all see on
various windows boxes with AcceptFilter data|connect|none against the ssl
listener;
Just wondering how we can test it if we can not yet (re)build the Win32/64
binaries from the source files...
Cheers,
Bing