Skip Menu |

This queue is for tickets about the Net-SSLeay CPAN distribution.

Report information
The Basics
Id: 35715
Status: resolved
Priority: 0/
Queue: Net-SSLeay

People
Owner: MIKEM [...] cpan.org
Requestors: crypkey [...] gmail.com
Cc:
AdminCc:

Bug Information
Severity: Important
Broken in: 1.32
Fixed in: (no value)



Subject: Net::SSleay::read packet split
The problem is when you want to sniff a connection and see the hole GET or POST packet.. it seems read() split the header and send it incomplete... You can use ssl_read_until() function and put \r\n\r\n as limit char.. but even this way you can't read for example the hole $_POST packet... only reads until Content-Lenght: and its not showing the DATA.. and if you put ssl_read_all it stays on the loop.. So the problems is that read() functions shows incomplete header packet...
Can you confirm this issue is now resolved? Cheers. On Thu May 08 03:05:54 2008, ck3y wrote: Show quoted text
> The problem is when you want to sniff a connection and see the hole
GET Show quoted text
> or POST packet.. it seems read() split the header and send it
incomplete... Show quoted text
> > You can use ssl_read_until() function and put \r\n\r\n as limit
char.. Show quoted text
> but even this way you can't read for example the hole $_POST
packet... Show quoted text
> only reads until Content-Lenght: and its not showing the DATA.. and
if Show quoted text
> you put ssl_read_all it stays on the loop.. > > So the problems is that read() functions shows incomplete header
packet...