On Mon, Aug 11, 2003 at 02:51:44PM +, Girish Hegde wrote:
> But by using those APIs i cannot do the testing for negtive flow, i started
> writing a TCP/IP server(non SSL) and tried to send the messages( like
> ServerHello, ServerHelloDone etc) mannually.
> I created the structures as defined
Hi Gilad,
First of all let me thank you for the kind positive response.
Yes, I am using the SSLeay libraries for the handshake thing to be done, to
test the positive flow.
But by using those APIs i cannot do the testing for negtive flow, i started
writing a TCP/IP server(non SSL) and tried to
On Mon, Aug 11, 2003, [EMAIL PROTECTED] wrote:
> Thank you for the hint it is worth thinking about another approach but I
> think I am through (and tested) with all but the last line that is:
> openssl ca -in server.csr -out server.crt -config openssl.conf -passin
> pass:password
> and the only pr
Hi girish,
As I said I am no wizard in ssl internals :-(
however what do you mean in negative flow ? do you refer ssl handshake
failure ?
I am now trying using the libwww-perl with the SSLeay for client
authentication against an apache server running mod_ssl (something like the
s_server util) and
Hi. I'm writing a small class that uses the ssl library. The "problem"
( I'm not sure who has the problem :-P ) is that SSL_connect() blocks when
the verify callback function returns 0. If it returns 1 all goes as
expected.
I'm using a blocking connect bio as the underlaying bio for the SSL
object
Hi Henrik Nordstrom,
I am working as a software
developer in India
I am having some problem with
the SSL_write() function.
I am new to the SSL standard
and i am in the learning stage
I have been given some
assignments which involves lot of SSL too.
I dont know much about SSL, and
what
> At the moment I let OpenSSL API calls take care of all the reads and
writes.
> Can I send/receive TCP urgent data ("out-of-band" data) with direct calls
on the socket,
> without interfering with the operation of SSL?
You can only do this if you do all the reads yourself. You have to rem
As you see openssl.org is used for relaying spam... This does not look good..
Can somebody fix it quickly?
Cheers
Franck
Received: from cobalt.sopac.org.fj (COBALT [10.0.0.150]) by
bigiron.sopac.org.fj with SMTP (Microsoft Exchange Internet Mail Service
Version 5.5.2653.13