Loading lib/vtls/mbedtls.c +15 −19 Original line number Diff line number Diff line Loading @@ -414,10 +414,8 @@ mbedtls_connect_step2(struct connectdata *conn, conn->recv[sockindex] = mbedtls_recv; conn->send[sockindex] = mbedtls_send; for(;;) { ret = mbedtls_ssl_handshake(&connssl->ssl); if(!ret) break; if(ret == MBEDTLS_ERR_SSL_WANT_READ) { connssl->connecting_state = ssl_connect_2_reading; return CURLE_OK; Loading @@ -426,8 +424,7 @@ mbedtls_connect_step2(struct connectdata *conn, connssl->connecting_state = ssl_connect_2_writing; return CURLE_OK; } else if(ret != MBEDTLS_ERR_SSL_WANT_READ && ret != MBEDTLS_ERR_SSL_WANT_WRITE) { else if(ret) { #ifdef MBEDTLS_ERROR_C mbedtls_strerror(ret, errorbuf, sizeof(errorbuf)); #endif /* MBEDTLS_ERROR_C */ Loading @@ -435,7 +432,6 @@ mbedtls_connect_step2(struct connectdata *conn, -ret, errorbuf); return CURLE_SSL_CONNECT_ERROR; } } infof(data, "mbedTLS: Handshake complete, cipher is %s\n", mbedtls_ssl_get_ciphersuite(&conn->ssl[sockindex].ssl) Loading Loading
lib/vtls/mbedtls.c +15 −19 Original line number Diff line number Diff line Loading @@ -414,10 +414,8 @@ mbedtls_connect_step2(struct connectdata *conn, conn->recv[sockindex] = mbedtls_recv; conn->send[sockindex] = mbedtls_send; for(;;) { ret = mbedtls_ssl_handshake(&connssl->ssl); if(!ret) break; if(ret == MBEDTLS_ERR_SSL_WANT_READ) { connssl->connecting_state = ssl_connect_2_reading; return CURLE_OK; Loading @@ -426,8 +424,7 @@ mbedtls_connect_step2(struct connectdata *conn, connssl->connecting_state = ssl_connect_2_writing; return CURLE_OK; } else if(ret != MBEDTLS_ERR_SSL_WANT_READ && ret != MBEDTLS_ERR_SSL_WANT_WRITE) { else if(ret) { #ifdef MBEDTLS_ERROR_C mbedtls_strerror(ret, errorbuf, sizeof(errorbuf)); #endif /* MBEDTLS_ERROR_C */ Loading @@ -435,7 +432,6 @@ mbedtls_connect_step2(struct connectdata *conn, -ret, errorbuf); return CURLE_SSL_CONNECT_ERROR; } } infof(data, "mbedTLS: Handshake complete, cipher is %s\n", mbedtls_ssl_get_ciphersuite(&conn->ssl[sockindex].ssl) Loading