If I recall correctly, when I saw this problem the issue was sending 
user data larger than the MTU detected during handshake negotiation.  
The DTLS code seems to have some inconsistencies related to this, as MTU 
should not have an effect on user data -- the protocol only provides 
fragmentation of handshakes.

  - Ariel

Joel Reardon via RT wrote:
> For version 0.9.8h
> in do_dtls1_write()
>
> in the block:
>
> /* first check if there is a SSL3_BUFFER still being written
>   * out.  This will happen with non blocking IO */
> if (s->s3->wbuf.left != 0)
> {
>         OPENSSL_assert(0); /* XDTLS:  want to see if we ever get
> here */
>         return(ssl3_write_pending(s,type,buf,len));
> }
>
>
> To answer the comment's question: "Yes, we do get there."
>
> Regards,
> Joel Reardon
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> Development Mailing List                       [email protected]
> Automated List Manager                           [EMAIL PROTECTED]
>
>   


-- 
 - Ariel Salomon / Senior Software Engineer
Real-Time Innovations (RTI) / www.rti.com
408 990-7439 / [EMAIL PROTECTED]

RTI - The Real-Time Middleware Experts



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to