Posts

Post not yet marked as solved
4 Replies
You can, but you also have to capture screen and just filter the samples out in the callback.
Post not yet marked as solved
4 Replies
I tried setting the TLS to 1.2 and get the same errors:Listener ready on Optional(62715) preparing preparing preparing 2019-06-18 16:54:21.839116-0400 ServerSample[7566:156875] [BoringSSL] boringssl_session_set_peer_verification_state_from_session(371) [C1:1][0x100711480] Unable to extract cached certificates from the SSL_SESSION object 2019-06-18 16:54:21.839184-0400 ServerSample[7566:156875] [BoringSSL] boringssl_helper_copy_certificates_from_session(254) [C1:1][0x100711480] SSL_get0_peer_certificates failed ready failed with error: POSIXErrorCode: Network is down failed with error: POSIXErrorCode: Network is downI can't really run the code as is with iOS12 or macOS10.14 because NWBrower and CryptoKit both require the new versions.
Post not yet marked as solved
4 Replies
I think I fixed an issue I was having with this sample codesec_protocol_options_append_tls_ciphersuite(tlsOptions.securityProtocolOptions, tls_ciphersuite_t(rawValue: TLS_PSK_WITH_AES_128_GCM_SHA256)!)Mac can't use this code because the cyphersuite constant is 32bit and it is 16bit on iOS. I am now using this.sec_protocol_options_add_tls_ciphersuite(tlsOptions.securityProtocolOptions, TLS_PSK_WITH_AES_128_GCM_SHA256)Now I am getting a new message2019-06-14 16:25:44.453889-0400 ServerSample[13334:241268] [BoringSSL] boringssl_session_set_peer_verification_state_from_session(371) [C8:1][0x10234bef0] Unable to extract cached certificates from the SSL_SESSION object2019-06-14 16:25:44.454002-0400 ServerSample[13334:241268] [BoringSSL] boringssl_helper_copy_certificates_from_session(248) [C8:1][0x10234bef0] SSL_get0_peer_certificates failedANY help would be appreciated.