and though I can walk to my client and server with 0x00
when i put another value of 0x02 0x03 0x04 my script fails at the
function
#-----------------------------------------------------------------------------
# nonblock($socket) puts socket into nonblocking mode
sub nonblock {
my $socket = shift;
my $flags;
$flags = fcntl($socket, F_GETFL, 0)
or die "Can't get flags for socket: $!\n";
fcntl($socket, F_SETFL, $flags | O_NONBLOCK)
or die "Can't make socket nonblocking: $!\n";
}
what my client server product that works only with 0x00
Le mercredi 21 mars 2012 à 17:33 -0700, Bob goolsby a écrit :
> What was wrong with the answer you received on Perl Monks?
>
>
>
>
> 2012/3/21 ml <[email protected]>:
> > hello list
> > hello guru of perl
> > hello all
> >
> >
> > I seek to understand how to position the value SSL_verify_mode => 0x00.
> >
> > can you explain how to properly use this parameter in
> > IO::Socket::SSL
> >
> > thank for reply
> >
> > sincerely
> >
> > --
> > http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC2626742
> > gpg --keyserver pgp.mit.edu --recv-key C2626742
> >
> > http://urlshort.eu fakessh @
> > http://gplus.to/sshfake
> > http://gplus.to/sshswilting
> > http://gplus.to/john.swilting
> > https://lists.fakessh.eu/mailman/
> > This list is moderated by me, but all applications will be accepted
> > provided they receive a note of presentation
>
>
>
> --
>
> Bob Goolsby
> [email protected]
>
--
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC2626742
gpg --keyserver pgp.mit.edu --recv-key C2626742
http://urlshort.eu fakessh @
http://gplus.to/sshfake
http://gplus.to/sshswilting
http://gplus.to/john.swilting
https://lists.fakessh.eu/mailman/
This list is moderated by me, but all applications will be accepted
provided they receive a note of presentation
signature.asc
Description: Ceci est une partie de message numériquement signée
