I think the best way is to look up in the apps directory s_client and
s_server examples.You will see that SSL_connect() is in a loop, and also
SSL_accept() in the server part (as far as I remember) .Then, you can also
see a SSL_should_retry() function that encapsulates all this kind of errors.


>Hi!
>
>Where did you get the man page for SSL_get_error() from?
>How can I find man pages for other SLL functions?
>
>Thanks
> Amnon Cohen
>
>> -----Original Message-----
>> From: [EMAIL PROTECTED]
>> [mailto:[EMAIL PROTECTED]]
>> Sent: Wednesday, January 26, 2000 12:35 AM
>> To: [EMAIL PROTECTED]
>> Cc: Matti Aarnio
>> Subject: Re: SSL_connect() fails on non-blocking sockets.
>>
>>
>> Matti Aarnio <[EMAIL PROTECTED]>:
>>
>> > It turned out that while the socket the SMTP client code creates is
>> > running in non-blocking mode, I must temporarily turn the
>> blocking mode
>> > on while the SSL setup negotiations are under way.
>> > I don't know if creating some wrapper to retry calls to
>> SSL_connect()
>> > would have helped, but such would have been rather massively kludgy
>> > thing..
>>
>> SSL_connect needs multiple I/O operations in both directions,
>> so you cannot expect it to finish at once for non-blocking I/O.
>> SSL_connect returning -1 does not always indicate an error.
>> Use SSL_get_error to find out if the application should
>> select() for readable bytes or for a possibility to write
>> more data.
>>
>> >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>> >>>>>>>>>>>>>>>
>>
>> NAME
>>     SSL_get_error - obtain result code for SSL I/O operation
>>
>> SYNOPSIS
>>      #include <openssl/ssl.h>
>>
>>      int SSL_get_error(SSL *ssl, int ret);
>>
>> DESCRIPTION
>>     SSL_get_error() returns a result code (suitable for the C
>>     "switch" statement) for a preceding call to SSL_connect(),
>>     SSL_accept(), SSL_read(), or SSL_write() on ssl. The value
>>     returned by that SSL I/O function must be passed to
>>     SSL_get_error() in parameter ret.
>>
>>     In addition to ssl and ret, SSL_get_error() inspects the current
>>     thread's OpenSSL error queue. Thus, SSL_get_error() must be used
>>     in the same thread that performed the SSL I/O operation, and no
>>     other OpenSSL function calls should appear inbetween. The
>>     current thread's error queue must be empty before the SSL I/O
>>     operation is attempted, or SSL_get_error() will not work
>>     reliably.
>>
>> RETURN VALUES
>>     The following return values can currently occur:
>>
>>     SSL_ERROR_NONE
>>         The SSL I/O operation completed. This result code is
>>         returned if and only if ret 0>.
>>
>>     SSL_ERROR_ZERO_RETURN
>>         The SSL connection has been closed. If the protocol version
>>         is SSL 3.0 or TLS 1.0, this result code is returned only if
>>         a closure alerts has occured in the protocol, i.e. if the
>>         connection has been closed cleanly.
>>
>>     SSL_ERROR_WANT_READ, SSL_ERROR_WANT_WRITE
>>         The operation did not complete; the same SSL I/O function
>>         should be called again later. There will be protocol
>>         progress if, by then, the underlying BIO has data available
>>         for reading (if the result code is SSL_ERROR_WANT_READ) or
>>         allows writing data (SSL_ERROR_WANT_WRITE). For socket BIOs
>>         (e.g. when SSL_set_fd() was used) this means that select()
>>         or poll() on the underlying socket can be used to find out
>>         when the SSL I/O function should be retried.
>>
>>         Caveat: Any SSL I/O function can lead to either of
>>         SSL_ERROR_WANT_READ and SSL_ERROR_WANT_WRITE, i.e.
>>         SSL_read() may want to write data and SSL_write() may want
>>         to read data.
>>
>>     SSL_ERROR_WANT_X509_LOOKUP
>>         The operation did not complete because an application
>>         callback set by SSL_CTX_set_client_cert_cb() has asked to be
>>         called again. The SSL I/O function should be called again
>>         later. Details depend on the application.
>>
>>     SSL_ERROR_SYSCALL
>>         Some I/O error occurred. The OpenSSL error queue may contain
>>         more information on the error. If the error queue is empty
>>         (i.e. ERR_get_error() returns 0), ret can be used to find
>>         out more about the error: If ret == 0, an EOF was observed
>>         that violates the protocol. If ret == -1, the underlying BIO
>>         reported an I/O error. (For socket I/O on Unix systems,
>>         consult errno.)
>>
>>     SSL_ERROR_SSL
>>         A failure in the SSL library occured, usually a protocol
>>         error. The OpenSSL error queue contains more information on
>>         the error.
>>
>> SEE ALSO
>>     ssl(3), err(3)
>>
>> HISTORY
>>     SSL_get_error() was added in SSLeay 0.8.
>>
>> <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
>> <<<<<<<<<<<<<<<
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> Development Mailing List                       [EMAIL PROTECTED]
>> Automated List Manager                           [EMAIL PROTECTED]
>>
>______________________________________________________________________
>OpenSSL Project                                 http://www.openssl.org
>Development Mailing List                       [EMAIL PROTECTED]
>Automated List Manager                           [EMAIL PROTECTED]
>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to