On 16/01/18 15:15, Huy Cong Vu wrote: >> - A wireshark trace of the communication between the two endpoints might >> be helpful to figure out what is going wrong > > ERR_print_errors_fp() before call of SSL_read returns nothing, which should be a good new... > By browsing Wireshark, I jump into a suspect packet from client that contains a RST flags after 1st connection: > 797 61.057009 192.168.1.4 192.168.1.121 TCP 54 63862 → 8042 [RST, ACK] Seq=3969 Ack=4619 Win=0 Len=0 > > Does this help? Please can you attach the actual trace? Or send it direct to me if it is large. Thanks Matt -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users