> [seggelm...@fh-muenster.de - Thu Sep 03 18:09:34 2009]: > > This patch adds the function dtls1_listen(SSL *s, struct sockaddr > *client), as well as the user accessible macro DTLSv1_listen(). It is > intended to be called with an SSL object with a listening socket. > [snip to example]
> > /* Wait for ClientHello with valid cookie (blocking) */ > while (!DTLSv1_listen(ssl, &client_addr)); > Is the above just an example or would it always block, possibly indefinitely? If so is there some way this could work with non-blocking I/O? Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org