Hello Support Team,
we want to buy your Legacy Lib for TLS communication, but we want to try it first and have dwonlaoed your trail version.
We try to get the TlsSocket running on a Windows Embedded Compact 2013 system, but at the moment without any effort.
We setup an Apache Server with SSL functionality on Windows 10 system and want to connect from the Winodws Embedded Compact System to the Apache Server.
The conection itself is working, but when i run the command socket.Negotiate() the function will not return and the application freezes.
Below you can see the Log which i copied from the Windows Embedded Compact 2013 system from your library.
Can you help and tell me what iam donig wrong? Or do you have a test scenario, which i can try to execute?
Thank you in advance
Best regards,
Markus
LOG:
2022-10-18 08:30:38 Opening log file.
2022-10-18 08:30:38 INFO FileLogWriter(1)[33030594] Info: Assembly: Rebex.Common R5.9 for .NET Compact Framework 3.9
2022-10-18 08:30:38 INFO FileLogWriter(1)[33030594] Info: Platform: Windows CE 8.0.6294 32-bit; CLR: 3.9.19085.0
2022-10-18 08:30:38 DEBUG FileLogWriter(1)[33030594] Info: Culture: en; windows-1252
2022-10-18 08:30:38 INFO TlsClientSocket(1)[33030594] Info: Assembly: Rebex.Tls R5.9 for .NET Compact Framework 3.9 (Trial)
2022-10-18 08:30:38 INFO TlsClientSocket(1)[33030594] Info: Platform: Windows CE 8.0.6294 32-bit; CLR: 3.9.19085.0
2022-10-18 08:30:38 DEBUG TlsClientSocket(1)[33030594] Info: Culture: en; windows-1252
2022-10-18 08:30:39 DEBUG TlsSocket(52839839)[33030594] TLS: Enabled cipher suites: 0x000F3DF7EBE00640.
2022-10-18 08:30:39 DEBUG TlsSocket(52839839)[33030594] TLS: Applicable cipher suites: 0x00003C002BE00640.
2022-10-18 08:30:39 DEBUG TlsSocket(52839839)[33030594] TLS: Some ephemeral Diffie-Hellman ciphers are enabled. These might be slow on legacy platforms.
2022-10-18 08:30:39 DEBUG TlsSocket(52839839)[33030594] TLS: Some AES/GCM ciphers are enabled. These might be slow on legacy platforms.
2022-10-18 08:30:39 DEBUG TlsSocket(52839839)[33030594] TLS: HandshakeMessage:ClientHello was sent.
2022-10-18 08:30:39 DEBUG TlsSocket(52839839)[33030594] TLS: HandshakeMessage:ServerHello was received.
2022-10-18 08:30:39 INFO TlsSocket(52839839)[33030594] TLS: Negotiating TLS 1.2, RSA, AES with 256-bit key in GCM mode, AEAD.
2022-10-18 08:30:39 DEBUG TlsSocket(52839839)[33030594] TLS: The server supports secure renegotiation.
2022-10-18 08:30:39 DEBUG TlsSocket(52839839)[33030594] TLS: HandshakeMessage:Certificate was received.
2022-10-18 08:30:39 DEBUG TlsSocket(52839839)[33030594] TLS: HandshakeMessage:ServerHelloDone was received.
2022-10-18 08:30:39 DEBUG TlsSocket(52839839)[33030594] TLS: Verifying server certificate ('E=xxxxx, CN=xxxxx, OU=RnD, O=xxxx, L=xxxx, S=NRW, C=DE').
2022-10-18 08:30:39 DEBUG TlsSocket(52839839)[33030594] TLS: Certificate verification result: Accept
2022-10-18 08:30:39 DEBUG TlsSocket(52839839)[33030594] TLS: HandshakeMessage:ClientKeyExchange was sent.
2022-10-18 08:30:39 DEBUG TlsSocket(52839839)[33030594] TLS: CipherSpec:ChangeCipherSpec was sent.
2022-10-18 08:30:39 DEBUG TlsSocket(52839839)[33030594] TLS: HandshakeMessage:Finished was sent.