TLSContext *c = h->priv_data;
switch (ret) {
case errSSLWouldBlock:
- break;
+ return AVERROR(EAGAIN);
case errSSLXCertChainInvalid:
av_log(h, AV_LOG_ERROR, "Invalid certificate chain\n");
return AVERROR(EIO);
{
URLContext *h = (URLContext*)connection;
TLSContext *c = h->priv_data;
- int read = ffurl_read_complete(c->tls_shared.tcp, data, *dataLength);
+ size_t requested = *dataLength;
+ int read = ffurl_read(c->tls_shared.tcp, data, requested);
if (read <= 0) {
*dataLength = 0;
switch(AVUNERROR(read)) {
}
} else {
*dataLength = read;
- return noErr;
+ if (read < requested)
+ return errSSLWouldBlock;
+ else
+ return noErr;
}
}
if (peerTrust)
CFRelease(peerTrust);
}
- if (status == noErr)
+ if (status == noErr) {
break;
-
- av_log(h, AV_LOG_ERROR, "Unable to negotiate TLS/SSL session: %i\n", (int)status);
- ret = AVERROR(EIO);
- goto fail;
+ } else if (status != errSSLWouldBlock) {
+ av_log(h, AV_LOG_ERROR, "Unable to negotiate TLS/SSL session: %i\n", (int)status);
+ ret = AVERROR(EIO);
+ goto fail;
+ }
}
return 0;
case errSSLClosedGraceful:
case errSSLClosedNoNotify:
return 0;
+ case errSSLWouldBlock:
+ if (processed > 0)
+ return processed;
default:
return (int)status;
}