and though I can walk to my client and server with 0x00 when i put another value of 0x02 0x03 0x04 my script fails at the function #----------------------------------------------------------------------------- # nonblock($socket) puts socket into nonblocking mode sub nonblock { my $socket = shift; my $flags;
$flags = fcntl($socket, F_GETFL, 0) or die "Can't get flags for socket: $!\n"; fcntl($socket, F_SETFL, $flags | O_NONBLOCK) or die "Can't make socket nonblocking: $!\n"; } what my client server product that works only with 0x00 Le mercredi 21 mars 2012 à 17:33 -0700, Bob goolsby a écrit : > What was wrong with the answer you received on Perl Monks? > > > > > 2012/3/21 ml <m...@smtp.fakessh.eu>: > > hello list > > hello guru of perl > > hello all > > > > > > I seek to understand how to position the value SSL_verify_mode => 0x00. > > > > can you explain how to properly use this parameter in > > IO::Socket::SSL > > > > thank for reply > > > > sincerely > > > > -- > > http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC2626742 > > gpg --keyserver pgp.mit.edu --recv-key C2626742 > > > > http://urlshort.eu fakessh @ > > http://gplus.to/sshfake > > http://gplus.to/sshswilting > > http://gplus.to/john.swilting > > https://lists.fakessh.eu/mailman/ > > This list is moderated by me, but all applications will be accepted > > provided they receive a note of presentation > > > > -- > > Bob Goolsby > bob.gool...@gmail.com > -- http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC2626742 gpg --keyserver pgp.mit.edu --recv-key C2626742 http://urlshort.eu fakessh @ http://gplus.to/sshfake http://gplus.to/sshswilting http://gplus.to/john.swilting https://lists.fakessh.eu/mailman/ This list is moderated by me, but all applications will be accepted provided they receive a note of presentation
signature.asc
Description: Ceci est une partie de message numériquement signée