and though I can walk to my client and server with 0x00
when i put another value of 0x02 0x03 0x04 my script fails at the
function
#-----------------------------------------------------------------------------
# nonblock($socket) puts socket into nonblocking mode
sub nonblock {
    my $socket = shift;
    my $flags;

    
    $flags = fcntl($socket, F_GETFL, 0)
            or die "Can't get flags for socket: $!\n";
    fcntl($socket, F_SETFL, $flags | O_NONBLOCK)
            or die "Can't make socket nonblocking: $!\n";
}


what my client server product that works only with 0x00

Le mercredi 21 mars 2012 à 17:33 -0700, Bob goolsby a écrit :
> What was wrong with the answer you received on Perl Monks?
> 
> 
> 
> 
> 2012/3/21 ml <m...@smtp.fakessh.eu>:
> > hello list
> > hello guru of perl
> > hello all
> >
> >
> > I seek to understand how to position the value SSL_verify_mode => 0x00.
> >
> >        can you explain how to properly use this parameter in
> >        IO::Socket::SSL
> >
> > thank for reply
> >
> > sincerely
> >
> > --
> > http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC2626742
> >  gpg --keyserver pgp.mit.edu --recv-key C2626742
> >
> >  http://urlshort.eu fakessh @
> >  http://gplus.to/sshfake
> >  http://gplus.to/sshswilting
> >  http://gplus.to/john.swilting
> >  https://lists.fakessh.eu/mailman/
> >  This list is moderated by me, but all applications will be accepted
> >  provided they receive a note of presentation
> 
> 
> 
> -- 
> 
> Bob Goolsby
> bob.gool...@gmail.com
> 

-- 
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC2626742
 gpg --keyserver pgp.mit.edu --recv-key C2626742

 http://urlshort.eu fakessh @
 http://gplus.to/sshfake
 http://gplus.to/sshswilting
 http://gplus.to/john.swilting
 https://lists.fakessh.eu/mailman/
 This list is moderated by me, but all applications will be accepted
 provided they receive a note of presentation

Attachment: signature.asc
Description: Ceci est une partie de message numériquement signée

Reply via email to