Your SF bug report says that you put in a 300 millisecond delay. Where? Even if you think that such a fix is not good, it would be helpful to at least know what works. It might help track down the bug, or help others start looking at something smaller than ns_httpsget/post.
You also talk about truncation, but then the truncation stops if the received data goes above 81000. It might be a good idea to narrow down when the bug appears (what byte value) and when it goes away again. This might suggest something. tom jackson On Wed, Jul 15, 2009 at 3:35 PM, John Caruso<jcar...@arenasolutions.com> wrote: > On Wednesday 03:17 PM 7/15/2009, Scott Goodwin wrote: >> >> Tell me what version of OpenSSL you're running. > > OpenSSL 0.9.8k. It's been happening for many years with different OpenSSL > versions as well. -- AOLserver - http://www.aolserver.com/ To Remove yourself from this list, simply send an email to <lists...@listserv.aol.com> with the body of "SIGNOFF AOLSERVER" in the email message. You can leave the Subject: field of your email blank.