> When you use blocking socket now, you must react on SSL_ERROR_WANT*
> any many more - if not - you are doing mistake.

        If that's true, that's a defect in the implementation. People who use
blocking sockets should get blocking behavior.

> Good written application must react on this errors - sooner or later
> in development process.

        Well-written applications should tolerate all kinds of failure 
scenarios,
even the ones that aren't supposed to happen.

> My proposition was to add to one of this error situation when SSL_read()
> is doing renegotiation. Look at SSL dump.

        Your proposition was to add further breakage. It is a mistake to issue a
blocking socket operation if you do not wish to block, end of story. This is
just a single example of one way this can break and it is impossible to fix
it completely without breaking proper blocking applications that really do
want to block.

> In what way this break already used applications ???
> In what way this break anything ???

        It would have broken the application that this was about. If not for 
this
"problem", the author of this application would have released it with a
serious defect -- namely that it attempts to perform operations with
blocking sockets in a case where it cannot afford to block. Fortunately for
the original poster, he was able to detect this problem and can now easily
fix it by using non-blocking sockets. (And with luck he won't make this same
mistake with TCP, UDP, or any other protocol. It bites more people more
often than you might think. It's a common issue on USENET.)

        When code is broken and easy to fix, anything that makes the breakage
harder to detect is bad. Anything that makes it trigger more often and be
more easily detected is good. All other things being equal.

        DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to