> From: owner-openssl-us...@openssl.org On Behalf Of pankajy
> Sent: Monday, 05 December, 2011 10:26

> I am doing SSL Communication having no certification 
> validations on client
> and server side. So I skipped this validation and tried 
> SSL_connect with
> host. Here I can successfully connect with host using tcp 
> socket but unable
> to connect with host using SSL_connect. It fails with errror
> "error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert 
> handshake failure" 
> 
The *server* is aborting handshake. You need to find out 
what the server dislikes and fix it.

*One* cause of server handshake_failure is your failure 
to supply a cert when the server requires one. What 
exactly makes you think you shouldn't do 'validation'?
Does the server operator, or server software, say so?

You could try commandline s_client with -state or -msg 
to confirm at what point in the protocol it fails.

Nit: You don't actually *need* a socket BIO, OpenSSL's 
SSL_ routines *also* work just fine with a raw socket.
Your choice.

Also: your verify_callback isn't used (as posted), but 
if it were returning SSL_VERIFY_NONE is nonsensical.
SSL_VERIFY_ are used as modes to *set*. Once the callback 
is called, it should return 1 for okay or 0 for not_okay.
SSL_VERIFY_NONE happens to be 0, which means not_okay.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to