Comments on SSL_peek deficiencies

This commit is contained in:
Bodo Möller 2000-11-28 06:58:22 +00:00
parent 87739b2c53
commit 24b44446e2
3 changed files with 12 additions and 2 deletions

View File

@ -260,6 +260,9 @@ SSL_CIPHER *ssl2_get_cipher(unsigned int u)
int ssl2_pending(SSL *s)
{
/* Unlike ssl2_pending, this one probably works (if read-ahead
* is disabled), but it should be examined
* XXX */
return(s->s2->ract_data_length);
}

View File

@ -638,10 +638,10 @@ SSL_CIPHER *ssl3_get_cipher(unsigned int u)
return(NULL);
}
/* The problem is that it may not be the correct record type */
int ssl3_pending(SSL *s)
{
return(s->s3->rrec.length);
/* The problem is that it may not be the correct record type */
return(s->s3->rrec.length); /* FIXME */
}
int ssl3_new(SSL *s)

View File

@ -576,6 +576,13 @@ int SSL_get_read_ahead(SSL *s)
int SSL_pending(SSL *s)
{
/* SSL_pending cannot work properly if read-ahead is enabled
* (SSL_[CTX_]ctrl(..., SSL_CTRL_SET_READ_AHEAD, 1, NULL)),
* and it is impossible to fix since SSL_pending cannot report
* errors that may be observed while scanning the new data.
* (Note that SSL_pending() is often used as a boolean value,
* so we'd better not return -1.)
*/
return(s->method->ssl_pending(s));
}