> [seggelm...@fh-muenster.de - Thu Sep 03 18:09:34 2009]:
> 
> This patch adds the function dtls1_listen(SSL *s, struct sockaddr  
> *client), as well as the user accessible macro DTLSv1_listen(). It is  
> intended to be called with an SSL object with a listening socket.  
> 
[snip to example]

>               
>       /* Wait for ClientHello with valid cookie (blocking) */
>       while (!DTLSv1_listen(ssl, &client_addr));
> 

Is the above just an example or would it always block, possibly
indefinitely? If so is there some way this could work with non-blocking I/O?

Steve.
-- 
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to