diff options
author | Daniel Stenberg <daniel@haxx.se> | 2008-02-20 09:56:26 +0000 |
---|---|---|
committer | Daniel Stenberg <daniel@haxx.se> | 2008-02-20 09:56:26 +0000 |
commit | 53a549000c3634f6b0a5ed262d5834c3145885d7 (patch) | |
tree | 53ed658f9b454a41bf4f1a4c62573f2f0db8e667 /lib/sendf.c | |
parent | 55700cb01f4a01b8187f387e1655371e6fe0703a (diff) |
- Based on initial work done by Gautam Kachroo to address a bug, we now keep
better control at the exact state of the connection's SSL status so that we
know exactly when it has completed the SSL negotiation or not so that there
won't be accidental re-uses of connections that are wrongly believed to be
in SSL-completed-negotiate state.
Diffstat (limited to 'lib/sendf.c')
-rw-r--r-- | lib/sendf.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/lib/sendf.c b/lib/sendf.c index fe340236f..6aa4d8613 100644 --- a/lib/sendf.c +++ b/lib/sendf.c @@ -355,7 +355,7 @@ CURLcode Curl_write(struct connectdata *conn, CURLcode retcode; int num = (sockfd == conn->sock[SECONDARYSOCKET]); - if(conn->ssl[num].use) + if(conn->ssl[num].state == ssl_connection_complete) /* only TRUE if SSL enabled */ bytes_written = Curl_ssl_send(conn, num, mem, len); #ifdef USE_LIBSSH2 @@ -567,7 +567,7 @@ int Curl_read(struct connectdata *conn, /* connection data */ buffertofill = buf; } - if(conn->ssl[num].use) { + if(conn->ssl[num].state == ssl_connection_complete) { nread = Curl_ssl_recv(conn, num, buffertofill, bytesfromsocket); if(nread == -1) { |