Updated ssl_test to handle EOF return value
diff --git a/programs/test/ssl_test.c b/programs/test/ssl_test.c
index 97e308f..20907d8 100644
--- a/programs/test/ssl_test.c
+++ b/programs/test/ssl_test.c
@@ -329,7 +329,7 @@
 
         if( opt->command & COMMAND_READ )
         {
-            if( bytes_to_read == 0 )
+            while( bytes_to_read == 0 )
             {
                 bytes_to_read = rand() % opt->buffer_size;
                 offset_to_read = 0;
@@ -338,7 +338,7 @@
             ret = ssl_read( &ssl, read_buf + offset_to_read,
                             bytes_to_read );
 
-            if( ret >= 0 )
+            if( ret > 0 )
             {
                 for( i = 0; i < ret; i++ )
                 {
@@ -356,7 +356,9 @@
                 offset_to_read += ret;
             }
 
-            if( ret == POLARSSL_ERR_SSL_PEER_CLOSE_NOTIFY ||
+            if( ret == 0 ||
+                ret == POLARSSL_ERR_SSL_CONN_EOF ||
+                ret == POLARSSL_ERR_SSL_PEER_CLOSE_NOTIFY ||
                 ret == POLARSSL_ERR_NET_CONN_RESET )
             {
                 ret = 0;