diff options
author | Matthias Andree <matthias.andree@gmx.de> | 2011-04-28 23:18:46 +0200 |
---|---|---|
committer | Matthias Andree <matthias.andree@gmx.de> | 2011-04-28 23:18:46 +0200 |
commit | 2ef157e08bc4f8796223d179868a562648a5dbdd (patch) | |
tree | 2341d6138452d552fcc10e721f92063953d00695 | |
parent | 358a8083e9801482b4550e7e660f385545e6029c (diff) | |
download | fetchmail-2ef157e08bc4f8796223d179868a562648a5dbdd.tar.gz fetchmail-2ef157e08bc4f8796223d179868a562648a5dbdd.tar.bz2 fetchmail-2ef157e08bc4f8796223d179868a562648a5dbdd.zip |
Fix typo in comment.
-rw-r--r-- | socket.c | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -452,7 +452,7 @@ int SockRead(int sock, char *buf, int len) /* OK... SSL_peek works a little different from MSG_PEEK Problem is that SSL_peek can return 0 if there is no data currently available. If, on the other - hand, we loose the socket, we also get a zero, but + hand, we lose the socket, we also get a zero, but the SSL_read then SEGFAULTS! To deal with this, we'll check the error code any time we get a return of zero from SSL_peek. If we have an error, we bail. |