This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author pitrou
Recipients jcea, pitrou
Date 2011-06-16.12:53:18
SpamBayes Score 8.952007e-05
Marked as misclassified No
Message-id <1308228799.63.0.499619299795.issue12343@psf.upfronthosting.co.za>
In-reply-to
Content
> I am not getting the error in the handshake. I am getting it when
> transfering data, after a few Kbytes are already transfered.

Your traceback (and mine as well) occurs in wrap_socket() which itself calls do_handshake(). I don't understand how you could have transferred data *before* the SSL session is established. Or perhaps the test you posted doesn't reflect the actual issue?

By the way, faulty non-blocking code can work out of pure luck, if the target server and Internet connection is faster than the local computer...
History
Date User Action Args
2011-06-16 12:53:19pitrousetrecipients: + pitrou, jcea
2011-06-16 12:53:19pitrousetmessageid: <1308228799.63.0.499619299795.issue12343@psf.upfronthosting.co.za>
2011-06-16 12:53:19pitroulinkissue12343 messages
2011-06-16 12:53:18pitroucreate