If I recall correctly, when I saw this problem the issue was sending
user data larger than the MTU detected during handshake negotiation.
The DTLS code seems to have some inconsistencies related to this, as MTU
should not have an effect on user data -- the protocol only provides
fragmentation of handshakes.
- Ariel
Joel Reardon via RT wrote:
> For version 0.9.8h
> in do_dtls1_write()
>
> in the block:
>
> /* first check if there is a SSL3_BUFFER still being written
> * out. This will happen with non blocking IO */
> if (s->s3->wbuf.left != 0)
> {
> OPENSSL_assert(0); /* XDTLS: want to see if we ever get
> here */
> return(ssl3_write_pending(s,type,buf,len));
> }
>
>
> To answer the comment's question: "Yes, we do get there."
>
> Regards,
> Joel Reardon
>
> ______________________________________________________________________
> OpenSSL Project http://www.openssl.org
> Development Mailing List [email protected]
> Automated List Manager [EMAIL PROTECTED]
>
>
--
- Ariel Salomon / Senior Software Engineer
Real-Time Innovations (RTI) / www.rti.com
408 990-7439 / [EMAIL PROTECTED]
RTI - The Real-Time Middleware Experts
______________________________________________________________________
OpenSSL Project http://www.openssl.org
Development Mailing List [email protected]
Automated List Manager [EMAIL PROTECTED]