diff options
author | Timothy Pearson <kb9vqf@pearsoncomputing.net> | 2012-07-09 19:16:27 -0500 |
---|---|---|
committer | Timothy Pearson <kb9vqf@pearsoncomputing.net> | 2012-07-09 19:16:27 -0500 |
commit | 786b46a05369912c5883a5bc549b02287b91086e (patch) | |
tree | a5241519d7d2bd03d2dde5f5c3fbe5810b65330d /lib/libtdekrb/src/tdekrbclientsocket.cpp | |
parent | 83ded525e622feb0318c93d64012882e649568f6 (diff) | |
download | ulab-786b46a05369912c5883a5bc549b02287b91086e.tar.gz ulab-786b46a05369912c5883a5bc549b02287b91086e.zip |
Do not wait for incoming data when using socket read functions
Diffstat (limited to 'lib/libtdekrb/src/tdekrbclientsocket.cpp')
-rw-r--r-- | lib/libtdekrb/src/tdekrbclientsocket.cpp | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/lib/libtdekrb/src/tdekrbclientsocket.cpp b/lib/libtdekrb/src/tdekrbclientsocket.cpp index 9e9a27a..64929cb 100644 --- a/lib/libtdekrb/src/tdekrbclientsocket.cpp +++ b/lib/libtdekrb/src/tdekrbclientsocket.cpp @@ -287,7 +287,7 @@ int TDEKerberosClientSocket::processPendingData() { int reclen; int wrlen; char* buf = (char*)malloc(m_negotiatedMaxBufferSize); - reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize); + reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize, false); if (reclen < 0) { free(buf); return -1; @@ -348,7 +348,7 @@ TQ_LONG TDEKerberosClientSocket::readBlock(char *data, TQ_ULONG maxlen) { int wrlen; if (m_bufferLength <= 0) { char* buf = (char*)malloc(m_negotiatedMaxBufferSize); - reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize); + reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize, false); if (reclen < 0) { free(buf); return -1; @@ -412,7 +412,7 @@ TQ_LONG TDEKerberosClientSocket::readLine(char *data, TQ_ULONG maxlen) { int wrlen; if (m_bufferLength <= 0) { char* buf = (char*)malloc(m_negotiatedMaxBufferSize); - reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize); + reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize, false); if (reclen < 0) { free(buf); return -1; @@ -467,7 +467,7 @@ TQString TDEKerberosClientSocket::readLine() { maxlen = m_negotiatedMaxBufferSize; if (m_bufferLength <= 0) { buf = (char*)malloc(m_negotiatedMaxBufferSize); - reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize); + reclen = receiveEncryptedData(buf, m_negotiatedMaxBufferSize, false); if (reclen < 0) { free(buf); return TQString::null; |