Openssl With Proxy

Hi Friends,
I am facing some difficulties with OpenSSL implementation and am stuck at
handshake failure.
I have created a normal .exe (which acts as a server) which opens port 36003
and loads the required certificate and private key and waits for any
incoming connection.
Once I recieve connection request from the client and connection is accepted
using the funtion BIO_do_accept, the handshake process fails. I am using the
function BIO_do_handshake() for this.
The reason for failure I get is 'No shared cipher'.
I found a function which allows us to set the list of ciper suites that we
authorize our SSL object to use. The function is
SSL_CTX_set_cipher_list(SSL_CTX *ctx, const char *str) where ctx is the
context and *str is the list of ciper suites for e.g. str could be
I found that the client uses RC4_MD5 & RC4_SHA cipher suites. How to ensure
that my SSL context object uses the same cipher suite.
What string should I pass to SSL_CTX_set_cipher_list??? For e.g.
SSL_CTX_set_cipher_list(ctx, 'MD5!SHA') ???
Do let me know, if I have not been clear on the above issue
The information contained in this electronic message and any attachments to this message are intended for the exclusive use of the addressee(s) and may contain proprietary, confidential or privileged information. If you are not the intended recipient, you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately and destroy all copies of this message and any attachments.
WARNING: Computer viruses can be transmitted via email. The recipient should check this email and any attachments for the presence of viruses. The company accepts no liability for any damage caused by any virus transmitted by this email.
OpenSSL Project
User Support Mailing List [hidden email]
Automated List Manager [hidden email]

Aug 02, 2020 Create, Manage & Convert SSL Certificates with OpenSSL. One of the most popular commands in SSL to create, convert, manage the SSL Certificates is OpenSSL. There will be many situations where you have to deal with OpenSSL in various ways, and here I have listed them for you as a handy cheat sheet.

Openssl With Proxy Server


Openssl Connect With Proxy

  1. Openssl-sclient, sclient - SSL/TLS client program.proxy host:port When used with the -connect flag, the program uses the host and port specified with this flag and issues an HTTP CONNECT command to connect to the desired server.-unix path.
  2. OpenSSL is a de facto standard in this space and comes with a long history. The code initially began its life in 1995 under the name SSLeay,1 when it was developed by Eric A. Young and Tim J. OpenSSL as a separate project was born in 1998, when Eric and Tim decided to begin working on a commercial SSL/TLS toolkit called BSAFE SSL-C.