On 07/24/2011 03:55 AM, Michael Tuexen wrote:
On Jul 24, 2011, at 12:40 AM, com...@gmx.ch wrote:
I got some code which uses nonblocking dtls via self fed bios.
You are supposed to call DTLSv1_listen() to handle the front state...
#define DTLSv1_listen(ssl, peer) \
SSL_ctrl(ssl,DTLS_CTR
On Jul 24, 2011, at 12:40 AM, com...@gmx.ch wrote:
> Hi,
>
>
> I got some code which uses nonblocking dtls via self fed bios.
> If a unknown session comes up, I create a new session, feed/drain the
> sessions bios from/to the wire until SSL_accept returns success.
>
> Now, I added DTLS cookies
Hi,
I got some code which uses nonblocking dtls via self fed bios.
If a unknown session comes up, I create a new session, feed/drain the
sessions bios from/to the wire until SSL_accept returns success.
Now, I added DTLS cookies.
I expected SSL_accept to return an error if a ClientHello packet
Dear Users,
I have released version 4.40 of stunnel.
The ChangeLog entry:
Version 4.40, 2011.07.23, urgency: LOW:
* New Win32 features
- Added a GUI menu to save cached peer certificate chains.
- Added "-exit" option to stop stunnel *not* running as a service.
This option may be useful