On 16/01/18 15:15, Huy Cong Vu wrote:
>> - A wireshark trace of the communication between the two endpoints might
>> be helpful to figure out what is going wrong
> 
> ERR_print_errors_fp() before call of SSL_read returns nothing, which should 
> be a good new...
> By browsing Wireshark, I jump into a suspect packet from client that contains 
> a RST flags after 1st connection:
> 797   61.057009       192.168.1.4     192.168.1.121   TCP     54      63862 → 
> 8042 [RST, ACK] Seq=3969 Ack=4619 Win=0 Len=0
> 
> Does this help?

Please can you attach the actual trace? Or send it direct to me if it is
large.

Thanks

Matt
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to