[EMAIL PROTECTED] wrote:
Nils,
The basic succession of calls are as follows. I think the program waits
for an ssl_read or ssl_write to implicitly trigger the handshake process.
meth = TLSv1_client_method()
SSL_load_error_strings();
SSLeay_add_ssl_algorithms();
SSL_CTX_new(meth);
ssl =
Hello,
The basic succession of calls are as follows. I think the program
waits for an ssl_read or ssl_write to implicitly trigger the handshake
process.
meth = TLSv1_client_method()
SSL_load_error_strings();
SSLeay_add_ssl_algorithms();
SSL_CTX_new(meth);
ssl = SSL_new( ctx );
Hello,
The server side SSL is no longer terminated on the IIS server. It is
being handled by Cisco 11500 series content switches and it the
application will no longer work.
My proposition is to get ssldump and dump SSL handshake with IIS and
Cisco to check difference and working parameters
Excellent, excellent idea. Is ssldump
an API call? If so, I haven't seen that. Let me go out to the site
and look. I wish there were a more organized and informative source for
information on the openssl API.
That should definitely make the problem
expose itself. Thanks!
Marek Marcola
On Tue, 2006-08-29 at 13:52 -0400, [EMAIL PROTECTED] wrote:
Excellent, excellent idea. Is ssldump an API call? If so, I haven't
seen that. Let me go out to the site and look. I wish there were a
more organized and informative source for information on the openssl
API.
This is very useful
[EMAIL PROTECTED] wrote:
Excellent, excellent idea. Is ssldump an API call?
it's an application to analyze a ssl connection
(see http://www.rtfm.com/ssldump/ )
Cheers,
Nils
__
OpenSSL Project
Nils,
The basic succession of calls are as
follows. I think the program waits for an ssl_read or ssl_write to implicitly
trigger the handshake process.
meth = TLSv1_client_method()
SSL_load_error_strings();
SSLeay_add_ssl_algorithms();
SSL_CTX_new(meth);
ssl = SSL_new( ctx );
sbio =
Nils,
Yes, 0.9.6b is the exact version. Please
help!
Nils Larsch [EMAIL PROTECTED]
Sent by: [EMAIL PROTECTED]
08/26/2006 06:23 AM
Please respond to
openssl-users@openssl.org
To
openssl-users@openssl.org
cc
Subject
Re: Unable to locate the keystore/certificate
store or
[EMAIL PROTECTED] wrote:
Nils,
Yes, 0.9.6b is the exact version. Please help!
hmm, did you read the rest of my mail ? Do you have the source code ?
Cheers,
Nils
__
OpenSSL Project
Nils,
Yes. I read the entire e-mail. I can't
find ANYWHERE where it's being fed to the application, (including the source
code). As far as I can see, it's definitely not being used in an ssl_ library
call nor is he building his own in memory or using some other filename
etc. I don't see how the
Title: Message
I
don't see the execution platform given here. Perhaps you might consider
doing an 'strace' (if linux)? Anything that is opened and "secretly"
imported into the program should be discernible from this.
Just a
thought...
rnd
-Original Message-From:
[EMAIL
The platform is AIX. I don't think they've
ever explicitly used a *.pem file. Somehow the app was able to communicate
with an IIS server and complete the handshake process or at least communicate
and get txn's across, (I'm not sure how).
Diffenderfer, Randy
[EMAIL PROTECTED]
Sent by:
The server side SSL is no longer terminated
on the IIS server. It is being handled by Cisco 11500 series content switches
and it the application will no longer work.
Diffenderfer, Randy
[EMAIL PROTECTED]
Sent by: [EMAIL PROTECTED]
08/28/2006 03:23 PM
Please respond to
[EMAIL PROTECTED] wrote:
Hi,
I'm using openssl, (I think the slimmed down engine version), and
openssl 0.9.6 ? since there's no separate engine verion for openssl = 0.9.7
attempting to support a program written by someone else. The server that
I'm talking to recently moved to a new ISP
14 matches
Mail list logo