Re: Client certificate extraction out of SSL/TLS Connection on server side

2014-05-16 Thread Jens Alfke
On May 16, 2014, at 2:55 AM, Bastian Hafer wrote: > @Jens: What about the if !TARGET_OS_IPHONE. Is this implemented in your > framework to prevent someone using your framework on the iphone in a way that > their app gets rejected? Did I got that right? Right. In fact I think I added that #if

Re: Client certificate extraction out of SSL/TLS Connection on server side

2014-05-16 Thread Bastian Hafer
Hey, thanks Jens and Ben for your advice. I will try to play around with that. If it’s true that enabling client side authentication in the streams invalidates the app that is really a pity. Isn’t the optional client side authentication part of the SSL/TLS rfc? @Jens: What about the if !TARGET

Re: Client certificate extraction out of SSL/TLS Connection on server side

2014-05-15 Thread Ben Kennedy
As a workaround, couldn't you just empirically determine the value of that constant (presuming it hasn't changed in five years and is not expected to change), and then define a new constant of your own accordingly? b Sent from my iPhone > On May 15, 2014, at 1:06 PM, Jens Alfke wrote: > > I

Re: Client certificate extraction out of SSL/TLS Connection on server side

2014-05-15 Thread Jens Alfke
I went back and looked into some earlier code of mine that can do this (the MYNetwork framework, available on Github). The good news is that I know what stream property to set. The bad news is that it’s not in any public header, even though this omission has been known for five years or more. An

Client certificate extraction out of SSL/TLS Connection on server side

2014-05-14 Thread Bastian Hafer
Hey Developers, I am currently writing an client and a server that are communicating via SSL/TLS. Both of them have self signed certificates. The connection works fine and as far as I checked the traffic is encrypted. Now I want to extract the certificates from the working stream that are resp