This is off-original-topic and can be considered as thread stealing.
Therefore it might be appropriate to initiate another thread for
follow-up discussion specific to below.
Pierre,
Hello,
Maybe it can help that you find a complete WIN CE successful compile
process for openssl v100a there :
Hello,
I'm doing interop testing with our DTLS server and OpenSSL. I'm using
OpenSSL version OpenSSL 1.0.1c 10 May 2012 with the following command
line.
openssl s_client -msg -debug -connect 127.0.0.1:9683 -dtls1 -cert client.pem
-certform PEM -key client.key -keyform PEM -CAfile root.crt
On Nov 1, 2012, at 2:14 PM, Bojan Pisler wrote:
Hello,
I’m doing interop testing with our DTLS server and OpenSSL. I’m using OpenSSL
version “OpenSSL 1.0.1c 10 May 2012” with the following command line.
openssl s_client -msg -debug -connect 127.0.0.1:9683 -dtls1 -cert client.pem
Hello Michael,
Thanks for your input.
Sorry for being unclear in my first post. The main reason for my question
was to get input from someone with detail information about how OpenSSL
handles handshake message fragmentation and the finished MAC. Not to adapt
my implementation.
I will do as you
Steve,
FYI... I was able resolve this unknown size error when I discovered
that the error was not present when OpenSSL was built to produce a DLL
(instead of a static LIB).
The solution was to change e_os.h (line 310) from:
#if defined(_MSC_VER) !defined(_DLL) defined(stdin)
To:
#if