summaryrefslogtreecommitdiffstats
path: root/lib/libtdekrb/src/tdekrbclientsocket.cpp
diff options
context:
space:
mode:
authorTimothy Pearson <kb9vqf@pearsoncomputing.net>2012-07-09 19:16:27 -0500
committerTimothy Pearson <kb9vqf@pearsoncomputing.net>2012-07-09 19:16:27 -0500
commit786b46a05369912c5883a5bc549b02287b91086e (patch)
treea5241519d7d2bd03d2dde5f5c3fbe5810b65330d /lib/libtdekrb/src/tdekrbclientsocket.cpp
parent83ded525e622feb0318c93d64012882e649568f6 (diff)
downloadulab-786b46a05369912c5883a5bc549b02287b91086e.tar.gz
ulab-786b46a05369912c5883a5bc549b02287b91086e.zip
Do not wait for incoming data when using socket read functions
Diffstat (limited to 'lib/libtdekrb/src/tdekrbclientsocket.cpp')
-rw-r--r--lib/libtdekrb/src/tdekrbclientsocket.cpp8
1 files changed, 4 insertions, 4 deletions
diff --git a/lib/libtdekrb/src/tdekrbclientsocket.cpp b/lib/libtdekrb/src/tdekrbclientsocket.cpp
index 9e9a27a..64929cb 100644
--- a/lib/libtdekrb/src/tdekrbclientsocket.cpp
+++ b/lib/libtdekrb/src/tdekrbclientsocket.cpp
@@ -287,7 +287,7 @@ int TDEKerberosClientSocket::processPendingData() {
int reclen;
int wrlen;
char* buf = (char*)malloc(m_negotiatedMaxBufferSize);
- reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize);
+ reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize, false);
if (reclen < 0) {
free(buf);
return -1;
@@ -348,7 +348,7 @@ TQ_LONG TDEKerberosClientSocket::readBlock(char *data, TQ_ULONG maxlen) {
int wrlen;
if (m_bufferLength <= 0) {
char* buf = (char*)malloc(m_negotiatedMaxBufferSize);
- reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize);
+ reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize, false);
if (reclen < 0) {
free(buf);
return -1;
@@ -412,7 +412,7 @@ TQ_LONG TDEKerberosClientSocket::readLine(char *data, TQ_ULONG maxlen) {
int wrlen;
if (m_bufferLength <= 0) {
char* buf = (char*)malloc(m_negotiatedMaxBufferSize);
- reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize);
+ reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize, false);
if (reclen < 0) {
free(buf);
return -1;
@@ -467,7 +467,7 @@ TQString TDEKerberosClientSocket::readLine() {
maxlen = m_negotiatedMaxBufferSize;
if (m_bufferLength <= 0) {
buf = (char*)malloc(m_negotiatedMaxBufferSize);
- reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize);
+ reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize, false);
if (reclen < 0) {
free(buf);
return TQString::null;