* Description:
* Set the socket to either blocking or non-blocking mode.
*/
-static
-int nonblock(int socket, /* operate on this */
- int nonblock /* TRUE or FALSE */)
+
+int Curl_nonblock(int socket, /* operate on this */
+ int nonblock /* TRUE or FALSE */)
{
#undef SETBLOCK
#ifdef HAVE_O_NONBLOCK
continue;
/* set socket non-blocking */
- nonblock(sockfd, TRUE);
+ Curl_nonblock(sockfd, TRUE);
rc = connect(sockfd, ai->ai_addr, ai->ai_addrlen);
}
/* now disable the non-blocking mode again */
- nonblock(sockfd, FALSE);
+ Curl_nonblock(sockfd, FALSE);
if(addr)
*addr = ai; /* the address we ended up connected to */
}
/* Convert socket to non-blocking type */
- nonblock(sockfd, TRUE);
+ Curl_nonblock(sockfd, TRUE);
/* This is the loop that attempts to connect to all IP-addresses we
know for the given host. One by one. */
}
/* now disable the non-blocking mode again */
- nonblock(sockfd, FALSE);
+ Curl_nonblock(sockfd, FALSE);
if(addr)
/* this is the address we've connected to */
* $Id$
*****************************************************************************/
+int Curl_nonblock(int socket, /* operate on this */
+ int nonblock /* TRUE or FALSE */);
+
CURLcode Curl_connecthost(struct connectdata *conn,
Curl_addrinfo *host, /* connect to this */
long port, /* connect to this port number */
#ifdef USE_SSLEAY
/* the socket seems fine, but is the SSL later fine too? */
if(conn->ssl.use) {
- if(SSL_get_shutdown(conn->ssl.handle))
- return TRUE; /* this connection is dead! */
+ int peek;
+ int error;
+ Curl_nonblock(sock, TRUE);
+
+ peek = SSL_peek(conn->ssl.handle,
+ conn->data->state.buffer, BUFSIZE);
+
+ infof(conn->data, "SSL_peek returned %d\n", peek);
+
+ if(-1 == peek) {
+ error = SSL_get_error(conn->ssl.handle, peek);
+ infof(conn->data, "SSL_error returned %d\n", error);
+
+ if(SSL_ERROR_WANT_READ != error)
+ ret_val = TRUE;
+ }
+ else
+ /* peek did not return -1 */
+ ret_val = TRUE;
+
+ Curl_nonblock(sock, FALSE);
}
#endif
}