evbuffer_commit_space(input, space, n_used);
if (bev_ssl->underlying)
BEV_RESET_GENERIC_READ_TIMEOUT(bev);
-
- if (evbuffer_get_length(input) >= bev->wm_read.low)
- _bufferevent_run_readcb(bev);
}
return blocked ? 0 : 1;
{
int r;
int n_to_read;
+ int read_data = 0;
while (bev_ssl->write_blocked_on_read) {
r = do_write(bev_ssl, WRITE_FRAME);
if (do_read(bev_ssl, n_to_read) <= 0)
break;
+ read_data = 1;
+
/* Read all pending data. This won't hit the network
* again, and will (most importantly) put us in a state
* where we don't need to read anything else until the
n_to_read = bytes_to_read(bev_ssl);
}
+ if (read_data == 1) {
+ struct bufferevent *bev = &bev_ssl->bev.bev;
+ struct evbuffer *input = bev->input;
+
+ if (evbuffer_get_length(input) >= bev->wm_read.low) {
+ _bufferevent_run_readcb(bev);
+ }
+ }
+
if (!bev_ssl->underlying) {
/* Should be redundant, but let's avoid busy-looping */
if (bev_ssl->bev.read_suspended ||
r = do_read(bev_ssl, 1024); /* XXXX 1024 is a hack */
if (r <= 0)
break;
+ else {
+ struct bufferevent *bev = &bev_ssl->bev.bev;
+ struct evbuffer *input = bev->input;
+
+ if (evbuffer_get_length(input) >= bev->wm_read.low) {
+ _bufferevent_run_readcb(bev);
+ }
+ }
}
if (bev_ssl->read_blocked_on_write)
return;