> On 2. May 2017, at 08:03, mahesh gs wrote:
>
>
>
> On Sun, Apr 30, 2017 at 11:11 PM, Michael Tuexen
> wrote:
> > On 20. Apr 2017, at 20:01, mahesh gs wrote:
> >
> > Hi,
> >
> > This issue occur purely based on the time (sequence of events) at which SSL
> > read_state_machine enter the po
On Sun, Apr 30, 2017 at 11:11 PM, Michael Tuexen <
michael.tue...@lurchi.franken.de> wrote:
> > On 20. Apr 2017, at 20:01, mahesh gs wrote:
> >
> > Hi,
> >
> > This issue occur purely based on the time (sequence of events) at which
> SSL read_state_machine enter the post processing of certificate
> On 20. Apr 2017, at 20:01, mahesh gs wrote:
>
> Hi,
>
> This issue occur purely based on the time (sequence of events) at which SSL
> read_state_machine enter the post processing of certificate verify which is
> received from client.
>
> Handshake works fine if the certificate verify post p
Matt Caswell wrote on 04/20/2017 03:23 PM:
>
>
> On 20/04/17 14:19, Martin Brejcha wrote:
>>
>>
>> Matt Caswell wrote on 04/20/2017 01:29 PM:
>>>
>>>
>>> On 20/04/17 12:26, mahesh gs wrote:
Hi Matt,
Yes I raised github case for the same issue. I also tried running this
call
On 20/04/17 14:19, Martin Brejcha wrote:
>
>
> Matt Caswell wrote on 04/20/2017 01:29 PM:
>>
>>
>> On 20/04/17 12:26, mahesh gs wrote:
>>> Hi Matt,
>>>
>>> Yes I raised github case for the same issue. I also tried running this
>>> call flow with the latest SNAPSHOT code (openssl-SNAP-20170419)
Matt Caswell wrote on 04/20/2017 01:29 PM:
>
>
> On 20/04/17 12:26, mahesh gs wrote:
>> Hi Matt,
>>
>> Yes I raised github case for the same issue. I also tried running this
>> call flow with the latest SNAPSHOT code (openssl-SNAP-20170419) and
>> handshake is successful with the latest SNAPSHO
On 20/04/17 12:26, mahesh gs wrote:
> Hi Matt,
>
> Yes I raised github case for the same issue. I also tried running this
> call flow with the latest SNAPSHOT code (openssl-SNAP-20170419) and
> handshake is successful with the latest SNAPSHOT code which is not an
> official release.
>
> I check
Hi Matt,
Yes I raised github case for the same issue. I also tried running this call
flow with the latest SNAPSHOT code (openssl-SNAP-20170419) and handshake is
successful with the latest SNAPSHOT code which is not an official release.
I checked the github repo history and observer that during co
For those following this discussion Mahesh has created a github issue
with much more detail (at least I am assuming this is the same issue):
https://github.com/openssl/openssl/issues/3251
Matt
On 18/04/17 21:17, Michael Tuexen wrote:
>> On 13. Apr 2017, at 11:11, mahesh gs wrote:
>>
>> Hi,
>>
> On 13. Apr 2017, at 11:11, mahesh gs wrote:
>
> Hi,
>
> We are running SCTP connections with DTLS enabled in our application. We have
> adapted openssl version (openssl-1.1.0e) to achieve the same.
>
> We have generated the self signed root and node certificates for testing. We
> have a str
On 13/04/17 18:26, Martin Brejcha wrote:
>
>
> Matt Caswell wrote on 04/13/2017 03:45 PM:
>>
>>
>> On 13/04/17 10:11, mahesh gs wrote:
>>> Hi,
>>>
>>> We are running SCTP connections with DTLS enabled in our application. We
>>> have adapted openssl version (openssl-1.1.0e) to achieve the same.
> On 13. Apr 2017, at 19:26, Martin Brejcha wrote:
>
>
>
> Matt Caswell wrote on 04/13/2017 03:45 PM:
>>
>>
>> On 13/04/17 10:11, mahesh gs wrote:
>>> Hi,
>>>
>>> We are running SCTP connections with DTLS enabled in our application. We
>>> have adapted openssl version (openssl-1.1.0e) to ach
Matt Caswell wrote on 04/13/2017 03:45 PM:
>
>
> On 13/04/17 10:11, mahesh gs wrote:
>> Hi,
>>
>> We are running SCTP connections with DTLS enabled in our application. We
>> have adapted openssl version (openssl-1.1.0e) to achieve the same.
>>
>> We have generated the self signed root and node
> On 13. Apr 2017, at 11:11, mahesh gs wrote:
>
> Hi,
>
> We are running SCTP connections with DTLS enabled in our application. We have
> adapted openssl version (openssl-1.1.0e) to achieve the same.
>
> We have generated the self signed root and node certificates for testing. We
> have a str
On 13/04/17 10:11, mahesh gs wrote:
> Hi,
>
> We are running SCTP connections with DTLS enabled in our application. We
> have adapted openssl version (openssl-1.1.0e) to achieve the same.
>
> We have generated the self signed root and node certificates for
> testing. We have a strange problem w
Hi,
We are running SCTP connections with DTLS enabled in our application. We
have adapted openssl version (openssl-1.1.0e) to achieve the same.
We have generated the self signed root and node certificates for testing.
We have a strange problem with the incomplete DTLS handshake if we run the
DTLS
16 matches
Mail list logo