ftp->cache = NULL; /* clear the pointer */
ftp->cache_size = 0; /* zero the size just in case */
}
- else if(CURLE_OK != Curl_read(conn, sockfd, ptr,
- BUFSIZE-nread, &gotbytes))
- keepon = FALSE;
+ else {
+ int res = Curl_read(conn, sockfd, ptr,
+ BUFSIZE-nread, &gotbytes);
+ if(res < 0)
+ /* EWOULDBLOCK */
+ continue; /* go looping again */
+
+ if(CURLE_OK != res)
+ keepon = FALSE;
+ }
if(!keepon)
;
int subversion=0;
struct SessionHandle *data=conn->data;
CURLcode result;
+ int res;
int nread; /* total size read */
int perline; /* count bytes per line */
* to read, but when we use Curl_read() it may do so. Do confirm
* that this is still ok and then remove this comment!
*/
- if(CURLE_OK != Curl_read(conn, tunnelsocket, ptr, BUFSIZE-nread,
- &gotbytes))
+ res= Curl_read(conn, tunnelsocket, ptr, BUFSIZE-nread,
+ &gotbytes);
+ if(res< 0)
+ /* EWOULDBLOCK */
+ continue; /* go loop yourself */
+ else if(res)
keepon = FALSE;
else if(gotbytes <= 0) {
keepon = FALSE;
return CURLE_OK;
}
-
/*
* Internal read-from-socket function. This is meant to deal with plain
* sockets, SSL sockets and kerberos sockets.
+ *
+ * If the read would block (EWOULDBLOCK) we return -1. Otherwise we return
+ * a regular CURLcode value.
*/
-CURLcode Curl_read(struct connectdata *conn, int sockfd,
- char *buf, size_t buffersize,
- ssize_t *n)
+int Curl_read(struct connectdata *conn,
+ int sockfd,
+ char *buf,
+ size_t buffersize,
+ ssize_t *n)
{
ssize_t nread;
/* if there's data pending, then we re-invoke SSL_read() */
break;
}
- } while(loop && SSL_pending(conn->ssl.handle));
+ } while(0);
+ if(loop && SSL_pending(conn->ssl.handle))
+ return -1; /* basicly EWOULDBLOCK */
}
else {
#endif
else
#endif
nread = sread (sockfd, buf, buffersize);
+
+ if(-1 == nread) {
+#ifdef WIN32
+ if(EWOULDBLOCK == GetLastError())
+#else
+ if(EWOULDBLOCK == errno)
+#endif
+ return -1;
+ }
+
#ifdef USE_SSLEAY
}
#endif /* USE_SSLEAY */
size_t len);
/* internal read-function, does plain socket, SSL and krb4 */
-CURLcode Curl_read(struct connectdata *conn, int sockfd,
- char *buf, size_t buffersize,
- ssize_t *n);
+int Curl_read(struct connectdata *conn, int sockfd,
+ char *buf, size_t buffersize,
+ ssize_t *n);
/* internal write-function, does plain socket, SSL and krb4 */
CURLcode Curl_write(struct connectdata *conn, int sockfd,
void *mem, size_t len,
{
if(events.lNetworkEvents & FD_READ)
{
+ /* This reallu OUGHT to check its return code. */
Curl_read(conn, sockfd, buf, BUFSIZE - 1, &nread);
telrcv(conn, (unsigned char *)buf, nread);
}
if(FD_ISSET(sockfd, &readfd)) {
+ /* This OUGHT to check the return code... */
Curl_read(conn, sockfd, buf, BUFSIZE - 1, &nread);
/* if we receive 0 or less here, the server closed the connection and
{
struct Curl_transfer_keeper *k = &conn->keep;
struct SessionHandle *data = conn->data;
- CURLcode result;
+ int result;
ssize_t nread; /* number of bytes read */
int didwhat=0;
if((k->keepon & KEEP_READ) &&
FD_ISSET(conn->sockfd, &k->readfd)) {
- if ((k->bytecount == 0) && (k->writebytecount == 0))
- Curl_pgrsTime(data, TIMER_STARTTRANSFER);
-
- didwhat |= KEEP_READ;
-
/* read! */
result = Curl_read(conn, conn->sockfd, k->buf,
BUFSIZE -1, &nread);
- if(result)
+ if(0>result)
+ break; /* get out of loop */
+ if(result>0)
return result;
+ if ((k->bytecount == 0) && (k->writebytecount == 0))
+ Curl_pgrsTime(data, TIMER_STARTTRANSFER);
+
+
+ didwhat |= KEEP_READ;
+
/* NULL terminate, allowing string ops to be used */
if (0 < (signed int) nread)
k->buf[nread] = 0;