Geoff Thorpe [EMAIL PROTECTED]:
The idea is that you hand those BIOs over to the SSL library, you
usually don't keep pointers of your own. SSL_free(ssl) will call
BIO_free for each of them, but just once if bio_read == bio_write, so
usually everything works as intended. Obviously this is
Hi,
Problem:
If the negotiated cipher is ADH (ie, the SSL_aNULL flag is set) and if
the verify mode is SSL_VERIFY_PEER, the server will send a certificate
request to the client. The receipt of this request by the client is
considered a fatal protocol error in TLS. Therefore, the request
I just had to recheck, and this does indeed work on NT 4.0 (SP6)
Winsock 1.1 requested , linked with wsock32.lib from VC6
That's not a valid test. You need to test against a 1.1 library not a
2.0 library with a 1.1 request.
Jeffrey Altman * Sr.Software Designer * Kermit-95 for Win32
Erik Aronesty wrote:
More verify woes:,
On a Win32 build (after passing all of the tests!), I connect to
this site (which works on all browsers), and it fails. This never
used to fail in the older (0.9.3) builds. Am I missing something
obvious?
D:\devl\openssl\out32openssl.exe