I'm writing an OpenSSL client program. It must interoperate with some .NET code that uses the SslStream classes. The .NET code is correct. If I create a .NET client it connects correctly. If I run the .NET server on Windows 7 it works correctly (with .NET client and with C plus OpenSSL client). If I run the .NET server code on Windows XP only the .NET client code works correctly. The OpenSSL code doesn't work. It returns
5760:error:1408F0C6:SSL routines:SSL3_GET_RECORD:packet length too long:.\ssl\s3_pkt.c:357 I've read this request http://comments.gmane.org/gmane.comp.encryption.openssl.user/28201 but the solution doesn't solve my problem (the suggestion is to use the SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER option) I've tried adding the -bugs option to the openssl command line tool (and/or adding the SSL_OP_ALL option to my C code) but I always get that error. The server requires a client certificate. I'm including a trace of the openssl command line tool: C:\OpenSslPackage>openssl s_client -debug -msg -state -nbio_test -tlsextdebug -bugs -connect 127.0.0.1:444 -certform PEM -cert client.crt -key client.key Enter pass phrase for client.key: Loading 'screen' into random state - done CONNECTED(00000774) SSL_connect:before/connect initialization write to 0xa73e98 [0xa740e8] (210 bytes => 4 (0x4)) 0000 - 16 03 01 ... 0004 - <SPACES/NULS> write to 0xa73e98 [0xa740ec] (206 bytes => 6 (0x6)) 0000 - cd 01 00 00 c9 03 ...... write to 0xa73e98 [0xa740f2] (200 bytes => 2 (0x2)) 0000 - 01 4f .O write to 0xa73e98 [0xa740f4] (198 bytes => 6 (0x6)) 0000 - 34 e0 20 4e 3b 88 4. N;. write to 0xa73e98 [0xa740fa] (192 bytes => 1 (0x1)) 0000 - 99 . write to 0xa73e98 [0xa740fb] (191 bytes => 6 (0x6)) 0000 - 8b 59 33 ae 14 6e .Y3..n write to 0xa73e98 [0xa74101] (185 bytes => 6 (0x6)) 0000 - df c0 a0 45 3f 56 ...E?V write to 0xa73e98 [0xa74107] (179 bytes => 5 (0x5)) 0000 - 94 21 57 03 9b .!W.. write to 0xa73e98 [0xa7410c] (174 bytes => 7 (0x7)) 0000 - cd e5 a7 71 91 af 2d ...q..- write to 0xa73e98 [0xa74113] (167 bytes => 4 (0x4)) 0000 - 00 00 5c c0 ..\. write to 0xa73e98 [0xa74117] (163 bytes => 7 (0x7)) 0000 - 14 c0 0a 00 39 00 38 ....9.8 write to 0xa73e98 [0xa7411e] (156 bytes => 7 (0x7)) 0000 - 00 88 00 87 c0 0f c0 ....... write to 0xa73e98 [0xa74125] (149 bytes => 2 (0x2)) 0000 - 05 . 0002 - <SPACES/NULS> write to 0xa73e98 [0xa74127] (147 bytes => 1 (0x1)) 0000 - 35 5 write to 0xa73e98 [0xa74128] (146 bytes => 7 (0x7)) 0000 - 00 84 c0 12 c0 08 ...... 0007 - <SPACES/NULS> write to 0xa73e98 [0xa7412f] (139 bytes => 1 (0x1)) 0000 - 16 . write to 0xa73e98 [0xa74130] (138 bytes => 2 (0x2)) 0000 - 00 13 .. write to 0xa73e98 [0xa74132] (136 bytes => -1 (0xFFFFFFFF)) SSL_connect:error in SSLv2/v3 write client hello B write W BLOCK write to 0xa73e98 [0xa74132] (136 bytes => 1 (0x1)) 0000 - c0 . write to 0xa73e98 [0xa74133] (135 bytes => 5 (0x5)) 0000 - 0d c0 03 00 0a ..... write to 0xa73e98 [0xa74138] (130 bytes => 4 (0x4)) 0000 - c0 13 c0 09 .... write to 0xa73e98 [0xa7413c] (126 bytes => 1 (0x1)) 0001 - <SPACES/NULS> write to 0xa73e98 [0xa7413d] (125 bytes => 1 (0x1)) 0000 - 33 3 write to 0xa73e98 [0xa7413e] (124 bytes => -1 (0xFFFFFFFF)) SSL_connect:error in SSLv2/v3 write client hello B write W BLOCK write to 0xa73e98 [0xa7413e] (124 bytes => 5 (0x5)) 0000 - 00 32 00 9a .2.. 0005 - <SPACES/NULS> write to 0xa73e98 [0xa74143] (119 bytes => 3 (0x3)) 0000 - 99 00 45 ..E write to 0xa73e98 [0xa74146] (116 bytes => 1 (0x1)) 0001 - <SPACES/NULS> write to 0xa73e98 [0xa74147] (115 bytes => 1 (0x1)) 0000 - 44 D write to 0xa73e98 [0xa74148] (114 bytes => -1 (0xFFFFFFFF)) SSL_connect:error in SSLv2/v3 write client hello B write W BLOCK write to 0xa73e98 [0xa74148] (114 bytes => 6 (0x6)) 0000 - c0 0e c0 04 00 2f ...../ write to 0xa73e98 [0xa7414e] (108 bytes => 3 (0x3)) 0000 - 00 96 .. 0003 - <SPACES/NULS> write to 0xa73e98 [0xa74151] (105 bytes => -1 (0xFFFFFFFF)) SSL_connect:error in SSLv2/v3 write client hello B write W BLOCK write to 0xa73e98 [0xa74151] (105 bytes => -1 (0xFFFFFFFF)) SSL_connect:error in SSLv2/v3 write client hello B write W BLOCK write to 0xa73e98 [0xa74151] (105 bytes => 4 (0x4)) 0000 - 41 00 07 c0 A... write to 0xa73e98 [0xa74155] (101 bytes => 6 (0x6)) 0000 - 11 c0 07 c0 0c c0 ...... write to 0xa73e98 [0xa7415b] (95 bytes => 3 (0x3)) 0000 - 02 00 05 ... write to 0xa73e98 [0xa7415e] (92 bytes => 3 (0x3)) 0000 - 00 04 .. 0003 - <SPACES/NULS> write to 0xa73e98 [0xa74161] (89 bytes => 1 (0x1)) 0000 - 15 . write to 0xa73e98 [0xa74162] (88 bytes => 6 (0x6)) 0000 - 00 12 00 09 00 14 ...... write to 0xa73e98 [0xa74168] (82 bytes => -1 (0xFFFFFFFF)) SSL_connect:error in SSLv2/v3 write client hello B write W BLOCK write to 0xa73e98 [0xa74168] (82 bytes => 1 (0x1)) 0001 - <SPACES/NULS> write to 0xa73e98 [0xa74169] (81 bytes => -1 (0xFFFFFFFF)) SSL_connect:error in SSLv2/v3 write client hello B write W BLOCK write to 0xa73e98 [0xa74169] (81 bytes => 6 (0x6)) 0000 - 11 00 08 00 06 ..... 0006 - <SPACES/NULS> write to 0xa73e98 [0xa7416f] (75 bytes => -1 (0xFFFFFFFF)) SSL_connect:error in SSLv2/v3 write client hello B write W BLOCK write to 0xa73e98 [0xa7416f] (75 bytes => 1 (0x1)) 0000 - 03 . write to 0xa73e98 [0xa74170] (74 bytes => 5 (0x5)) 0000 - 00 ff 01 ... 0005 - <SPACES/NULS> write to 0xa73e98 [0xa74175] (69 bytes => 2 (0x2)) 0000 - 44 D 0002 - <SPACES/NULS> write to 0xa73e98 [0xa74177] (67 bytes => 4 (0x4)) 0000 - 0b 00 04 03 .... write to 0xa73e98 [0xa7417b] (63 bytes => -1 (0xFFFFFFFF)) SSL_connect:error in SSLv2/v3 write client hello B write W BLOCK write to 0xa73e98 [0xa7417b] (63 bytes => 4 (0x4)) 0000 - 00 01 02 ... 0004 - <SPACES/NULS> write to 0xa73e98 [0xa7417f] (59 bytes => 1 (0x1)) 0000 - 0a . write to 0xa73e98 [0xa74180] (58 bytes => 2 (0x2)) 0000 - 00 34 .4 write to 0xa73e98 [0xa74182] (56 bytes => 2 (0x2)) 0000 - 00 32 .2 write to 0xa73e98 [0xa74184] (54 bytes => 1 (0x1)) 0001 - <SPACES/NULS> write to 0xa73e98 [0xa74185] (53 bytes => 1 (0x1)) 0000 - 01 . write to 0xa73e98 [0xa74186] (52 bytes => 1 (0x1)) 0001 - <SPACES/NULS> write to 0xa73e98 [0xa74187] (51 bytes => 4 (0x4)) 0000 - 02 00 03 ... 0004 - <SPACES/NULS> write to 0xa73e98 [0xa7418b] (47 bytes => 5 (0x5)) 0000 - 04 00 05 00 06 ..... write to 0xa73e98 [0xa74190] (42 bytes => 7 (0x7)) 0000 - 00 07 00 08 00 09 ...... 0007 - <SPACES/NULS> write to 0xa73e98 [0xa74197] (35 bytes => -1 (0xFFFFFFFF)) SSL_connect:error in SSLv2/v3 write client hello B write W BLOCK write to 0xa73e98 [0xa74197] (35 bytes => 1 (0x1)) 0000 - 0a . write to 0xa73e98 [0xa74198] (34 bytes => 3 (0x3)) 0000 - 00 0b .. 0003 - <SPACES/NULS> write to 0xa73e98 [0xa7419b] (31 bytes => 7 (0x7)) 0000 - 0c 00 0d 00 0e 00 0f ....... write to 0xa73e98 [0xa741a2] (24 bytes => 5 (0x5)) 0000 - 00 10 00 11 .... 0005 - <SPACES/NULS> write to 0xa73e98 [0xa741a7] (19 bytes => 4 (0x4)) 0000 - 12 00 13 ... 0004 - <SPACES/NULS> write to 0xa73e98 [0xa741ab] (15 bytes => 2 (0x2)) 0000 - 14 . 0002 - <SPACES/NULS> write to 0xa73e98 [0xa741ad] (13 bytes => 5 (0x5)) 0000 - 15 00 16 00 17 ..... write to 0xa73e98 [0xa741b2] (8 bytes => 2 (0x2)) 0000 - 00 18 .. write to 0xa73e98 [0xa741b4] (6 bytes => 2 (0x2)) 0000 - 00 19 .. write to 0xa73e98 [0xa741b6] (4 bytes => 4 (0x4)) 0000 - 00 23 .# 0004 - <SPACES/NULS> >>> TLS 1.0 Handshake [length 00cd], ClientHello 01 00 00 c9 03 01 4f 34 e0 20 4e 3b 88 99 8b 59 33 ae 14 6e df c0 a0 45 3f 56 94 21 57 03 9b cd e5 a7 71 91 af 2d 00 00 5c c0 14 c0 0a 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 44 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 01 00 02 00 03 00 04 00 05 00 06 00 07 00 08 00 09 00 0a 00 0b 00 0c 00 0d 00 0e 00 0f 00 10 00 11 00 12 00 13 00 14 00 15 00 16 00 17 00 18 00 19 00 23 00 00 SSL_connect:SSLv2/v3 write client hello B read from 0xa73e98 [0xa79648] (7 bytes => 7 (0x7)) 0000 - 16 03 01 86 f4 02 ...... 0007 - <SPACES/NULS> write to 0xa73e98 [0xa87000] (7 bytes => -1 (0xFFFFFFFF)) >>> TLS 1.0 Alert [length 0002], fatal record_overflow 02 16 SSL3 alert write:fatal:record overflow SSL_connect:error in SSLv3 read server hello A SSL_connect:error in SSLv3 read server hello A 5760:error:1408F0C6:SSL routines:SSL3_GET_RECORD:packet length too long:.\ssl\s3_pkt.c:357: --- no peer certificate available --- No client certificate CA names sent --- SSL handshake has read 7 bytes and written 7 bytes --- New, (NONE), Cipher is (NONE) Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1 Cipher : 0000 Session-ID: Session-ID-ctx: Master-Key: Key-Arg : None PSK identity: None PSK identity hint: None Start Time: 1328865313 Timeout : 300 (sec) Verify return code: 0 (ok) --- Thanks
I'm writing an OpenSSL client program. It must interoperate with some .NET code that uses the SslStream classes. The .NET code is correct. If I create a .NET client it connects correctly. If I run the .NET server on Windows 7 it works correctly (with .NET client and with C plus OpenSSL client). If I run the .NET server code on Windows XP only the .NET client code works correctly. The OpenSSL code doesn't work. It returns
5760:error:1408F0C6:SSL routines:SSL3_GET_RECORD:packet length too long:.\ssl\s3_pkt.c:357
I've read this request http://comments.gmane.org/gmane.comp.encryption.openssl.user/28201 but the solution doesn't solve my problem (the suggestion is to use the SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER option)
I've tried adding the -bugs option to the openssl command line tool (and/or adding the SSL_OP_ALL option to my C code) but I always
get that error.
The server requires a client certificate.
I'm including a trace of the openssl command line tool:
C:\OpenSslPackage>openssl s_client -debug -msg -state -nbio_test -tlsextdebug -bugs
-connect 127.0.0.1:444 -certform PEM -cert client.crt -key client.key
Enter pass phrase for client.key:
Loading 'screen' into random state - done
CONNECTED(00000774)
SSL_connect:before/connect initialization
write to 0xa73e98 [0xa740e8] (210 bytes => 4 (0x4))
0000 - 16 03 01 ...
0004 -
<SPACES/NULS>
write to 0xa73e98 [0xa740ec] (206 bytes => 6 (0x6))
0000 - cd 01 00 00 c9 03 ......
write to 0xa73e98 [0xa740f2] (200 bytes => 2 (0x2))
0000 - 01 4f .O
write to 0xa73e98 [0xa740f4] (198 bytes => 6 (0x6))
0000 - 34 e0 20 4e 3b 88
4. N;.
write to 0xa73e98 [0xa740fa] (192 bytes => 1 (0x1))
0000 - 99 .
write to 0xa73e98 [0xa740fb] (191 bytes => 6 (0x6))
0000 - 8b 59 33 ae 14 6e .Y3..n
write to 0xa73e98 [0xa74101] (185 bytes =>
6 (0x6))
0000 - df c0 a0 45 3f 56 ...E?V
write to 0xa73e98 [0xa74107] (179 bytes => 5 (0x5))
0000 - 94 21 57 03 9b .!W..
write to 0xa73e98 [0xa7410c] (174 bytes => 7 (0x7))
0000 - cd e5 a7 71 91 af 2d ...q..-
write to 0xa73e98 [0xa74113] (167 bytes => 4 (0x4))
0000 - 00 00 5c c0 ..\.
write to 0xa73e98 [0xa74117] (163 bytes => 7 (0x7))
0000 - 14 c0 0a 00 39 00 38 ....9.8
write to 0xa73e98 [0xa7411e] (156 bytes => 7 (0x7))
0000 - 00 88 00 87 c0 0f c0
.......
write to 0xa73e98 [0xa74125] (149 bytes => 2 (0x2))
0000 - 05 .
0002 - <SPACES/NULS>
write to 0xa73e98 [0xa74127] (147 bytes => 1 (0x1))
0000 - 35 5
write to 0xa73e98 [0xa74128] (146 bytes => 7 (0x7))
0000 - 00 84 c0 12 c0 08 ......
0007 - <SPACES/NULS>
write to 0xa73e98 [0xa7412f] (139 bytes => 1 (0x1))
0000 - 16 .
write to 0xa73e98 [0xa74130] (138 bytes => 2 (0x2))
0000 - 00 13 ..
write to 0xa73e98 [0xa74132] (136 bytes => -1 (0xFFFFFFFF))
SSL_connect:error in SSLv2/v3 write client hello B
write W BLOCK
write to 0xa73e98 [0xa74132] (136 bytes => 1 (0x1))
0000 - c0 .
write to 0xa73e98 [0xa74133] (135 bytes => 5 (0x5))
0000 - 0d c0 03 00 0a .....
write to 0xa73e98 [0xa74138] (130 bytes => 4 (0x4))
0000 - c0 13 c0 09 ....
write to 0xa73e98 [0xa7413c] (126 bytes => 1 (0x1))
0001 - <SPACES/NULS>
write to 0xa73e98 [0xa7413d] (125 bytes => 1 (0x1))
0000 - 33 3
write to 0xa73e98 [0xa7413e] (124 bytes => -1 (0xFFFFFFFF))
SSL_connect:error in SSLv2/v3 write client hello B
write W BLOCK
write to 0xa73e98 [0xa7413e] (124 bytes => 5 (0x5))
0000 - 00 32 00 9a
.2..
0005 - <SPACES/NULS>
write to 0xa73e98 [0xa74143] (119 bytes => 3 (0x3))
0000 - 99 00 45 ..E
write to 0xa73e98 [0xa74146] (116 bytes => 1 (0x1))
0001 - <SPACES/NULS>
write to 0xa73e98 [0xa74147] (115 bytes => 1 (0x1))
0000 - 44 D
write to 0xa73e98 [0xa74148] (114 bytes => -1 (0xFFFFFFFF))
SSL_connect:error in SSLv2/v3 write client hello B
write W BLOCK
write to 0xa73e98 [0xa74148] (114 bytes => 6 (0x6))
0000 - c0 0e c0 04 00 2f ...../
write to
0xa73e98 [0xa7414e] (108 bytes => 3 (0x3))
0000 - 00 96 ..
0003 - <SPACES/NULS>
write to 0xa73e98 [0xa74151] (105 bytes => -1 (0xFFFFFFFF))
SSL_connect:error in SSLv2/v3 write client hello B
write W BLOCK
write to 0xa73e98 [0xa74151] (105 bytes => -1 (0xFFFFFFFF))
SSL_connect:error in SSLv2/v3 write client hello B
write W BLOCK
write to 0xa73e98 [0xa74151] (105 bytes => 4 (0x4))
0000 - 41 00 07 c0 A...
write to 0xa73e98 [0xa74155] (101 bytes => 6 (0x6))
0000 - 11 c0 07 c0 0c c0 ......
write to 0xa73e98 [0xa7415b] (95 bytes
=> 3 (0x3))
0000 - 02 00 05 ...
write to 0xa73e98 [0xa7415e] (92 bytes => 3 (0x3))
0000 - 00 04 ..
0003 - <SPACES/NULS>
write to 0xa73e98 [0xa74161] (89 bytes => 1 (0x1))
0000 - 15
.
write to 0xa73e98 [0xa74162] (88 bytes => 6 (0x6))
0000 - 00 12 00 09 00 14 ......
write to 0xa73e98 [0xa74168] (82 bytes => -1 (0xFFFFFFFF))
SSL_connect:error in SSLv2/v3 write client hello B
write W BLOCK
write to 0xa73e98 [0xa74168] (82 bytes => 1
(0x1))
0001 - <SPACES/NULS>
write to 0xa73e98 [0xa74169] (81 bytes => -1 (0xFFFFFFFF))
SSL_connect:error in SSLv2/v3 write client hello B
write W BLOCK
write to 0xa73e98 [0xa74169] (81 bytes => 6 (0x6))
0000 - 11 00 08 00 06 .....
0006 - <SPACES/NULS>
write to 0xa73e98 [0xa7416f] (75 bytes => -1 (0xFFFFFFFF))
SSL_connect:error in SSLv2/v3 write client hello B
write W BLOCK
write to 0xa73e98 [0xa7416f] (75 bytes => 1 (0x1))
0000 - 03 .
write to 0xa73e98 [0xa74170] (74 bytes => 5 (0x5))
0000 - 00 ff 01
...
0005 - <SPACES/NULS>
write to 0xa73e98 [0xa74175] (69 bytes => 2 (0x2))
0000 - 44 D
0002 - <SPACES/NULS>
write to 0xa73e98 [0xa74177] (67 bytes => 4 (0x4))
0000 - 0b 00 04 03
....
write to 0xa73e98 [0xa7417b] (63 bytes => -1 (0xFFFFFFFF))
SSL_connect:error in SSLv2/v3 write client hello B
write W BLOCK
write to 0xa73e98 [0xa7417b] (63 bytes => 4 (0x4))
0000 - 00 01 02 ...
0004 - <SPACES/NULS>
write to 0xa73e98
[0xa7417f] (59 bytes => 1 (0x1))
0000 - 0a .
write to 0xa73e98 [0xa74180] (58 bytes => 2 (0x2))
0000 - 00 34 .4
write to 0xa73e98 [0xa74182] (56 bytes => 2 (0x2))
0000 - 00 32
.2
write to 0xa73e98 [0xa74184] (54 bytes => 1 (0x1))
0001 - <SPACES/NULS>
write to 0xa73e98 [0xa74185] (53 bytes => 1 (0x1))
0000 - 01 .
write to 0xa73e98 [0xa74186] (52 bytes => 1 (0x1))
0001 - <SPACES/NULS>
write to 0xa73e98 [0xa74187] (51 bytes => 4 (0x4))
0000 - 02 00 03 ...
0004 - <SPACES/NULS>
write to 0xa73e98 [0xa7418b] (47 bytes => 5 (0x5))
0000 - 04 00 05 00 06 .....
write to 0xa73e98 [0xa74190] (42 bytes => 7 (0x7))
0000 - 00 07 00 08 00 09 ......
0007 - <SPACES/NULS>
write to 0xa73e98 [0xa74197] (35 bytes => -1 (0xFFFFFFFF))
SSL_connect:error in SSLv2/v3 write client hello B
write W BLOCK
write to 0xa73e98 [0xa74197] (35 bytes => 1 (0x1))
0000 - 0a
.
write to 0xa73e98 [0xa74198] (34 bytes => 3 (0x3))
0000 - 00 0b ..
0003 - <SPACES/NULS>
write to 0xa73e98 [0xa7419b] (31 bytes => 7 (0x7))
0000 - 0c 00 0d 00 0e 00 0f .......
write to 0xa73e98 [0xa741a2] (24 bytes => 5
(0x5))
0000 - 00 10 00 11 ....
0005 - <SPACES/NULS>
write to 0xa73e98 [0xa741a7] (19 bytes => 4 (0x4))
0000 - 12 00 13 ...
0004 - <SPACES/NULS>
write to 0xa73e98 [0xa741ab] (15 bytes => 2 (0x2))
0000 - 14 .
0002 - <SPACES/NULS>
write to 0xa73e98 [0xa741ad] (13 bytes => 5 (0x5))
0000 - 15 00 16 00 17 .....
write to 0xa73e98 [0xa741b2] (8 bytes => 2 (0x2))
0000 - 00 18
..
write to 0xa73e98 [0xa741b4] (6 bytes => 2 (0x2))
0000 - 00 19 ..
write to 0xa73e98 [0xa741b6] (4 bytes => 4 (0x4))
0000 - 00 23 .#
0004 - <SPACES/NULS>
>>> TLS 1.0 Handshake [length 00cd], ClientHello
01 00 00 c9 03 01 4f 34 e0 20 4e 3b 88 99 8b 59
33 ae 14 6e df c0 a0 45 3f 56 94 21 57 03 9b cd
e5 a7 71 91 af 2d 00 00 5c c0 14 c0 0a 00 39 00
38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0
08 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 00
33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00
2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00
05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00
06 00 03 00 ff 01 00 00 44 00 0b 00 04 03 00 01
02 00 0a 00 34 00 32 00 01 00 02 00 03 00 04 00
05 00 06 00 07 00 08 00 09 00 0a 00 0b 00 0c 00
0d 00 0e 00 0f 00 10 00 11 00 12 00 13 00 14 00
15 00 16 00 17 00 18 00 19 00 23 00 00
SSL_connect:SSLv2/v3 write client hello B
read from 0xa73e98 [0xa79648] (7 bytes => 7 (0x7))
0000 - 16 03 01 86 f4 02 ......
0007 - <SPACES/NULS>
write to 0xa73e98 [0xa87000] (7 bytes => -1 (0xFFFFFFFF))
>>> TLS 1.0 Alert [length 0002], fatal record_overflow
02 16
SSL3 alert
write:fatal:record overflow
SSL_connect:error in SSLv3 read server hello A
SSL_connect:error in SSLv3 read server hello A
5760:error:1408F0C6:SSL routines:SSL3_GET_RECORD:packet length too long:.\ssl\s3_pkt.c:357:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL
handshake has read 7 bytes and written 7 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : TLSv1
Cipher : 0000
Session-ID:
Session-ID-ctx:
Master-Key:
Key-Arg : None
PSK identity: None
PSK identity hint: None
Start Time: 1328865313
Timeout : 300 (sec)
Verify return code: 0 (ok)
---
Thanks