Fickle 93 3

Author: m | 2025-04-25

★★★★☆ (4.7 / 3189 reviews)

got your life

Get the Fickle APP! Listen LIVE; Fickle Feed; Win Stuff. Contests; Fickle Newsletter; Pick Up Your Prize; Contest Rules; Concerts Events. Concerts; Around Town; Fickle 93.3

winamp 5.21 full

Fickle Feed – Page 3 – Fickle 93.3

Than a piper man, one day it called to youI lost you, I lost you to the summer windThe autumn wind, and the winter winds they have come and goneAnd still the days, those lonely days, they go on and onAnd guess who sighs his lullabies through nights that never endMy fickle friend, the summer windThe summer windWarm summer windThe summer wind The summer wind, came blowin' in from across the seaIt lingered there, so warm and fair to walk with meAll summer long, we sang a song and strolled on golden sandTwo sweethearts, and the summer windLike painted kites, those days and nights went flyin' byThe world was new, beneath a blue umbrella skyThen softer than, a piper man one day it called to youI lost you to the summer windThe autumn wind, and the winter wind, they have come and goneBut still the days, those lonely days go on and onBut guess who sighs his lullabies through nights that never endMy fickle friend, the summer windThe autumn wind, and the winter wind, they have come and goneBut still the days, those lonely days go on and onAnd guess who sighs his lullabies through nights that never endMy fickle friend, the summer windThat summer windWarm, warm summer wind Hmm, that summer wind Somebody thrills the skiesWhen she looks in your eyesGuess who?Guess who?Somebody longs to be partOf the song in your heartGuess who? Guess who?Whose heart is sure to melt like butterThe moment that you utter"I do" "I do"Oh

download windows 7 ultimate

Heard on Fickle – Fickle 93.3

Umbrella skyThen softer than, a piper man, one day it called to youI lost you, I lost you to the summer windThe autumn wind, and the winter winds they have come and goneAnd still the days, those lonely days they go on and onAnd guess who sighs his lullabies through nights that never endMy fickle friend, the summer windThe summer wind, warm summer wind, the summer wind The summer wind came blowin' in from across the seaIt lingered there, to touch your hair and walk with meAll summer long we sang a song and then we strolled that golden sandTwo sweethearts and the summer windLike painted kites, those days and nights they went flyin' byThe world was new beneath a blue umbrella skyThen softer than a piper man, one day it called to youI lost you, I lost you to the summer windThe autumn wind, and the winter winds they have come and goneAnd still the days, those lonely days, they go on and onAnd guess who sighs his lullabies through nights that never endMy fickle friend, the summer windThe summer windWarm summer windThe summer wind We need you! Help build the largest human-edited lyrics collection on the web!

Fickle Feed – Fickle 93.3

Rcvd CertificateVerify in connStatus 2*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 Received CERTIFICATE_VERIFY in connStatus 2. processing...*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 CertificateVerify can be processed*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 msg_seq:4,msg_len:260,frag_len:260,frag_off: 0*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 Allow: CertificateVerify in status 3*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 record length 272*spamApTask4: Dec 07 13:48:12.849: 00000000: 16 fe fd 00 00 00 00 00 00 00 05 01 10 0f 00 01 ................*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d1f00, buflen 285*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: SSL state = 0x21c0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: SSL_state_string=SSLv3 read finished A*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d1f00 in status 3*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 No Change Cipher Spec pending Cert Verify done state.*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 Releasing lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 Called... for connection 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 Buffer length 91, alloc_len 95*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 record=ChangeCipherSpec epoch=0 seq=6*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 seq_num 6 epoch 0con->rx_seq 5 con->rx_epoch 0*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 5 rx_epoch 0*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 Got DTLS_RECORD_CHANGE_CIPHER_SPEC*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 Received CHANGE_CIPHER_SPEC in connStatus 3. processing...*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 DTLS_RECORD_CHANGE_CIPHER_SPEC can be processed*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 record length 1*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 record=Handshake epoch=1 seq=0*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 1*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 updated con with rx_seq_valid 255 rx_seq 0 rx_epoch 1*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 msg=Unknown or Encrypted*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 record length 64*spamApTask4: Dec 07 13:48:12.856: 00000000: 14 fe fd 00 00 00 00 00 00 00 06 00 01 01 16 fe ................*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d1f00, buflen 91*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: SSL state = 0x21c0; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: SSL_state_string=SSLv3 read finished A*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: SSL state = 0x21d0; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: SSL_state_string=SSLv3 write change cipher spec A*spamApTask4: Dec. Get the Fickle APP! Listen LIVE; Fickle Feed; Win Stuff. Contests; Fickle Newsletter; Pick Up Your Prize; Contest Rules; Concerts Events. Concerts; Around Town; Fickle 93.3

Heard on Fickle Fickle 93.3

07 13:48:12.488: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d1f00 in status 1*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 Releasing lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Called... for connection 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Buffer length 283, alloc_len 287*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=4*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 seq_num 4 epoch 0con->rx_seq 3 con->rx_epoch 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 3 rx_epoch 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 msg=ClientKeyExchange len=258 seq=3 frag_off=0 frag_len=258*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Rcvd ClientKeyExchange in connStatus 1*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Received CLIENT_KEY_EXCHANGE in status 1. processing...*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 ClientKeyExchange can be processed*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 msg_seq:3,msg_len:258,frag_len:258,frag_off: 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Allow: ClientKeyExchange in status 2*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 record length 270*spamApTask4: Dec 07 13:48:12.489: 00000000: 16 fe fd 00 00 00 00 00 00 00 04 01 0e 10 00 01 ................*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d1f00, buflen 283*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:48:12.704: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d1f00 in status 2*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 No pending Cert Verify in Client Key Exchange done state.*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 Releasing lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 Called... for connection 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 Buffer length 285, alloc_len 289*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=5*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 seq_num 5 epoch 0con->rx_seq 4 con->rx_epoch 0*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 4 rx_epoch 0*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 msg=CertificateVerify len=260 seq=4 frag_off=0 frag_len=260*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92

3 Doors Down – Fickle 93.3

A0:93:51:76:e2:92 Certificate verification - passed!*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Check for bufferred msgs - 0x1a4d22e0(1)*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d22e0 in status 1*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL state = 0x2180; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL_state_string=SSLv3 read client certificate A*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d22e0 in status 1*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Releasing lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Called... for connection 0x1a4d22e0*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Buffer length 283, alloc_len 287*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=4*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 seq_num 4 epoch 0con->rx_seq 3 con->rx_epoch 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 3 rx_epoch 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 msg=ClientKeyExchange len=258 seq=3 frag_off=0 frag_len=258*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Rcvd ClientKeyExchange in connStatus 1*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Received CLIENT_KEY_EXCHANGE in status 1. processing...*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 ClientKeyExchange can be processed*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 msg_seq:3,msg_len:258,frag_len:258,frag_off: 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Allow: ClientKeyExchange in status 2*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 record length 270*spamApTask4: Dec 07 13:51:07.765: 00000000: 16 fe fd 00 00 00 00 00 00 00 04 01 0e 10 00 01 ................*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d22e0, buflen 283*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d22e0 in status 2*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 No pending Cert Verify in Client Key Exchange done state.*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:51:07.980:

Fickle 93.3 News – Fickle 93.3

Con 0x1a4d20f0 in status 2*spamApTask4: Dec 07 13:49:11.251: a0:93:51:76:e2:92 No pending Cert Verify in Client Key Exchange done state.*spamApTask4: Dec 07 13:49:11.251: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:49:11.251: a0:93:51:76:e2:92 Releasing lock for 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 Called... for connection 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 Buffer length 285, alloc_len 289*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=5*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 seq_num 5 epoch 0con->rx_seq 4 con->rx_epoch 0*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 4 rx_epoch 0*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 msg=CertificateVerify len=260 seq=4 frag_off=0 frag_len=260*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 Rcvd CertificateVerify in connStatus 2*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 Received CERTIFICATE_VERIFY in connStatus 2. processing...*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 CertificateVerify can be processed*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 msg_seq:4,msg_len:260,frag_len:260,frag_off: 0*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 Allow: CertificateVerify in status 3*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 record length 272*spamApTask4: Dec 07 13:49:11.387: 00000000: 16 fe fd 00 00 00 00 00 00 00 05 01 10 0f 00 01 ................*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d20f0, buflen 285*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: SSL state = 0x21c0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: SSL_state_string=SSLv3 read finished A*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d20f0 in status 3*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 No Change Cipher Spec pending Cert Verify done state.*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 Releasing lock for 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 Called... for connection 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 Buffer length 91, alloc_len 95*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 record=ChangeCipherSpec epoch=0 seq=6*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 seq_num 6 epoch 0con->rx_seq 5 con->rx_epoch 0*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 5 rx_epoch 0*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 Got DTLS_RECORD_CHANGE_CIPHER_SPEC*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 Received CHANGE_CIPHER_SPEC in connStatus 3. processing...*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 DTLS_RECORD_CHANGE_CIPHER_SPEC can be processed*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 record length 1*spamApTask4: Dec 07 13:49:11.395: a0:93:51:76:e2:92 record=Handshake epoch=1 seq=0*spamApTask4: Dec 07 13:49:11.395: a0:93:51:76:e2:92 con->rx_seq_valid

Jim Weekdays 3-7pm Fickle 93.3

00000000: 16 fe fd 00 00 00 00 00 00 00 03 01 82 0b 00 03 ................*spamApTask4: Dec 07 13:49:11.027: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d20f0, buflen 399*spamApTask4: Dec 07 13:49:11.034: a0:93:51:76:e2:92 Certificate verification - passed!*spamApTask4: Dec 07 13:49:11.034: a0:93:51:76:e2:92 Check for bufferred msgs - 0x1a4d20f0(1)*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d20f0 in status 1*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: SSL state = 0x2180; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: SSL_state_string=SSLv3 read client certificate A*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d20f0 in status 1*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Releasing lock for 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Called... for connection 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Buffer length 283, alloc_len 287*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=4*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 seq_num 4 epoch 0con->rx_seq 3 con->rx_epoch 0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 3 rx_epoch 0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 msg=ClientKeyExchange len=258 seq=3 frag_off=0 frag_len=258*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Rcvd ClientKeyExchange in connStatus 1*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Received CLIENT_KEY_EXCHANGE in status 1. processing...*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 ClientKeyExchange can be processed*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 msg_seq:3,msg_len:258,frag_len:258,frag_off: 0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Allow: ClientKeyExchange in status 2*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 record length 270*spamApTask4: Dec 07 13:49:11.035: 00000000: 16 fe fd 00 00 00 00 00 00 00 04 01 0e 10 00 01 ................*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d20f0, buflen 283*spamApTask4: Dec 07 13:49:11.250: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:49:11.250: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.250: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.250: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:49:11.251: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:49:11.251: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.251: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.251: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:49:11.251: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:49:11.251: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for. Get the Fickle APP! Listen LIVE; Fickle Feed; Win Stuff. Contests; Fickle Newsletter; Pick Up Your Prize; Contest Rules; Concerts Events. Concerts; Around Town; Fickle 93.3

snap tol

JOIN THE FICKLE NATION NEWSLETTER! – Fickle 93.3

A0:93:51:76:e2:92 Releasing lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Called... for connection 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Buffer length 285, alloc_len 289*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=5*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 seq_num 5 epoch 0con->rx_seq 4 con->rx_epoch 0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 4 rx_epoch 0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 msg=CertificateVerify len=260 seq=4 frag_off=0 frag_len=260*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Rcvd CertificateVerify in connStatus 2*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Received CERTIFICATE_VERIFY in connStatus 2. processing...*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 CertificateVerify can be processed*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 msg_seq:4,msg_len:260,frag_len:260,frag_off: 0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Allow: CertificateVerify in status 3*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 record length 272*spamApTask4: Dec 07 13:51:08.111: 00000000: 16 fe fd 00 00 00 00 00 00 00 05 01 10 0f 00 01 ................*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d22e0, buflen 285*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: SSL state = 0x21c0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: SSL_state_string=SSLv3 read finished A*spamApTask4: Dec 07 13:51:08.117: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:51:08.117: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d22e0 in status 3*spamApTask4: Dec 07 13:51:08.117: a0:93:51:76:e2:92 No Change Cipher Spec pending Cert Verify done state.*spamApTask4: Dec 07 13:51:08.117: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:51:08.117: a0:93:51:76:e2:92 Releasing lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 Called... for connection 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 Buffer length 91, alloc_len 95*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 record=ChangeCipherSpec epoch=0 seq=6*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 seq_num 6 epoch 0con->rx_seq 5 con->rx_epoch 0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 5 rx_epoch 0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 Got DTLS_RECORD_CHANGE_CIPHER_SPEC*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 Received CHANGE_CIPHER_SPEC in connStatus 3. processing...*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 DTLS_RECORD_CHANGE_CIPHER_SPEC can be processed*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 record length 1*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 record=Handshake epoch=1 seq=0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 1*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 updated con with rx_seq_valid 255 rx_seq 0 rx_epoch 1*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 msg=Unknown or Encrypted*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 record

FICKLE-FRIDAY-HAPPY-HOUR – Fickle 93.3

Just have to taste me when he's kissin' youIf you want forever, I bet you doJust know you'll taste me tooTaste me too (ow)You'll just have to taste me when he's kissin' youYou, no, yeah, uh-uhYou'll just have to taste me when he's kissin' you Guess who's back?Guess who's back? Guess who's back?Guess who's back?Da-da-da, da, da, da, da, da, daDa-da-da, da, da, da, daWell, look what the stork brung (what?) The summer wind, came blowin' in from across the seaIt lingered there, so warm and fair to walk with meAll summer long, we sang a song and strolled on golden sandTwo sweethearts, and the summer windLike painted kites, those days and nights went flyin' byThe world was new, beneath a blue umbrella skyThen softer than, a piper man one day it called to youI lost you to the summer windThe autumn wind, and the winter wind, they have come and goneBut still the days, those lonely days go on and onBut guess who sighs his lullabies through nights that never endMy fickle friend, the summer windThe autumn wind, and the winter wind, they have come and goneBut still the days, those lonely days go on and onAnd guess who sighs his lullabies through nights that never endMy fickle friend, the summer windThat summer windWarm, warm summer wind Hmm, that summer wind Guess who's coming to dinner, Natty DreadlocksGuess who's coming to dinner, Natty DreadlocksOh I can see you brought some herb for me, Natty DreadlocksAnd Rasta near land Nyah. Get the Fickle APP! Listen LIVE; Fickle Feed; Win Stuff. Contests; Fickle Newsletter; Pick Up Your Prize; Contest Rules; Concerts Events. Concerts; Around Town; Fickle 93.3 Fickle Feed; Get the Fickle APP! Win Stuff. Contests; Fickle Newsletter; Pick Up Your Prize; Contest Rules; Concerts Events. Concerts; Around Town; Fickle 93.3 Community Calendar;

Fickle Feed – Page 5 – Fickle 93.3

Public sympathies, and natural forces can bend our destinies this way and that; dynasties are founded or foundered by fickle fate.Two other interesting thematic threads are: how commodity overthrows integrity, and the question of whether physical attractiveness equates to nobility of spirit while ugliness accords with baseness.Bastard gives voice to the play's outrage at the dishonor of commodity (i.e., material gain's triumph over honor):"That smooth-fac'd gentleman, tickling commodity,--Commodity, the bias of the world; The world, who of itself is peised well, Made to run even upon even ground, Till this advantage, this vile-drawing bias, This sway of motion, this commodity, Makes it take head from all indifferency, From all direction, purpose, course, intent: And this same bias, this commodity, This bawd, this broker, this all-changing word, Clapp'd on the outward eye of fickle France, Hath drawn him from his own determin'd aid, From a resolv'd and honourable war, To a most base and vile-concluded peace."George Orwell saw in this a fair reflection of the political realities of his own world in 1942, and so of course I see in it a reflection of our world today as well, as this is presumably timeless.But in typical Shakespearean fashion, though Bastard is prompted to think and speak cynically..."Well, whiles I am a beggar, I will rail, And say, There is no sin but to be rich; And being rich my virtue then shall be, To say, There is no vice but beggary: Since kings break faith upon commodity, Gain, be my lord!--for

Comments

User6510

Than a piper man, one day it called to youI lost you, I lost you to the summer windThe autumn wind, and the winter winds they have come and goneAnd still the days, those lonely days, they go on and onAnd guess who sighs his lullabies through nights that never endMy fickle friend, the summer windThe summer windWarm summer windThe summer wind The summer wind, came blowin' in from across the seaIt lingered there, so warm and fair to walk with meAll summer long, we sang a song and strolled on golden sandTwo sweethearts, and the summer windLike painted kites, those days and nights went flyin' byThe world was new, beneath a blue umbrella skyThen softer than, a piper man one day it called to youI lost you to the summer windThe autumn wind, and the winter wind, they have come and goneBut still the days, those lonely days go on and onBut guess who sighs his lullabies through nights that never endMy fickle friend, the summer windThe autumn wind, and the winter wind, they have come and goneBut still the days, those lonely days go on and onAnd guess who sighs his lullabies through nights that never endMy fickle friend, the summer windThat summer windWarm, warm summer wind Hmm, that summer wind Somebody thrills the skiesWhen she looks in your eyesGuess who?Guess who?Somebody longs to be partOf the song in your heartGuess who? Guess who?Whose heart is sure to melt like butterThe moment that you utter"I do" "I do"Oh

2025-04-02
User8989

Umbrella skyThen softer than, a piper man, one day it called to youI lost you, I lost you to the summer windThe autumn wind, and the winter winds they have come and goneAnd still the days, those lonely days they go on and onAnd guess who sighs his lullabies through nights that never endMy fickle friend, the summer windThe summer wind, warm summer wind, the summer wind The summer wind came blowin' in from across the seaIt lingered there, to touch your hair and walk with meAll summer long we sang a song and then we strolled that golden sandTwo sweethearts and the summer windLike painted kites, those days and nights they went flyin' byThe world was new beneath a blue umbrella skyThen softer than a piper man, one day it called to youI lost you, I lost you to the summer windThe autumn wind, and the winter winds they have come and goneAnd still the days, those lonely days, they go on and onAnd guess who sighs his lullabies through nights that never endMy fickle friend, the summer windThe summer windWarm summer windThe summer wind We need you! Help build the largest human-edited lyrics collection on the web!

2025-04-15
User5377

07 13:48:12.488: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d1f00 in status 1*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 Releasing lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Called... for connection 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Buffer length 283, alloc_len 287*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=4*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 seq_num 4 epoch 0con->rx_seq 3 con->rx_epoch 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 3 rx_epoch 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 msg=ClientKeyExchange len=258 seq=3 frag_off=0 frag_len=258*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Rcvd ClientKeyExchange in connStatus 1*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Received CLIENT_KEY_EXCHANGE in status 1. processing...*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 ClientKeyExchange can be processed*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 msg_seq:3,msg_len:258,frag_len:258,frag_off: 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Allow: ClientKeyExchange in status 2*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 record length 270*spamApTask4: Dec 07 13:48:12.489: 00000000: 16 fe fd 00 00 00 00 00 00 00 04 01 0e 10 00 01 ................*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d1f00, buflen 283*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:48:12.704: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d1f00 in status 2*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 No pending Cert Verify in Client Key Exchange done state.*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 Releasing lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 Called... for connection 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 Buffer length 285, alloc_len 289*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=5*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 seq_num 5 epoch 0con->rx_seq 4 con->rx_epoch 0*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 4 rx_epoch 0*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 msg=CertificateVerify len=260 seq=4 frag_off=0 frag_len=260*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92

2025-03-30
User3107

A0:93:51:76:e2:92 Certificate verification - passed!*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Check for bufferred msgs - 0x1a4d22e0(1)*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d22e0 in status 1*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL state = 0x2180; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL_state_string=SSLv3 read client certificate A*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d22e0 in status 1*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Releasing lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Called... for connection 0x1a4d22e0*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Buffer length 283, alloc_len 287*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=4*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 seq_num 4 epoch 0con->rx_seq 3 con->rx_epoch 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 3 rx_epoch 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 msg=ClientKeyExchange len=258 seq=3 frag_off=0 frag_len=258*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Rcvd ClientKeyExchange in connStatus 1*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Received CLIENT_KEY_EXCHANGE in status 1. processing...*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 ClientKeyExchange can be processed*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 msg_seq:3,msg_len:258,frag_len:258,frag_off: 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Allow: ClientKeyExchange in status 2*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 record length 270*spamApTask4: Dec 07 13:51:07.765: 00000000: 16 fe fd 00 00 00 00 00 00 00 04 01 0e 10 00 01 ................*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d22e0, buflen 283*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d22e0 in status 2*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 No pending Cert Verify in Client Key Exchange done state.*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:51:07.980:

2025-04-10
User9534

00000000: 16 fe fd 00 00 00 00 00 00 00 03 01 82 0b 00 03 ................*spamApTask4: Dec 07 13:49:11.027: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d20f0, buflen 399*spamApTask4: Dec 07 13:49:11.034: a0:93:51:76:e2:92 Certificate verification - passed!*spamApTask4: Dec 07 13:49:11.034: a0:93:51:76:e2:92 Check for bufferred msgs - 0x1a4d20f0(1)*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d20f0 in status 1*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: SSL state = 0x2180; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: SSL_state_string=SSLv3 read client certificate A*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d20f0 in status 1*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Releasing lock for 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Called... for connection 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Buffer length 283, alloc_len 287*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=4*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 seq_num 4 epoch 0con->rx_seq 3 con->rx_epoch 0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 3 rx_epoch 0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 msg=ClientKeyExchange len=258 seq=3 frag_off=0 frag_len=258*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Rcvd ClientKeyExchange in connStatus 1*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Received CLIENT_KEY_EXCHANGE in status 1. processing...*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 ClientKeyExchange can be processed*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 msg_seq:3,msg_len:258,frag_len:258,frag_off: 0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Allow: ClientKeyExchange in status 2*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 record length 270*spamApTask4: Dec 07 13:49:11.035: 00000000: 16 fe fd 00 00 00 00 00 00 00 04 01 0e 10 00 01 ................*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d20f0, buflen 283*spamApTask4: Dec 07 13:49:11.250: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:49:11.250: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.250: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.250: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:49:11.251: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:49:11.251: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.251: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.251: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:49:11.251: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:49:11.251: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for

2025-03-31
User4633

A0:93:51:76:e2:92 Releasing lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Called... for connection 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Buffer length 285, alloc_len 289*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=5*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 seq_num 5 epoch 0con->rx_seq 4 con->rx_epoch 0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 4 rx_epoch 0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 msg=CertificateVerify len=260 seq=4 frag_off=0 frag_len=260*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Rcvd CertificateVerify in connStatus 2*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Received CERTIFICATE_VERIFY in connStatus 2. processing...*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 CertificateVerify can be processed*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 msg_seq:4,msg_len:260,frag_len:260,frag_off: 0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Allow: CertificateVerify in status 3*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 record length 272*spamApTask4: Dec 07 13:51:08.111: 00000000: 16 fe fd 00 00 00 00 00 00 00 05 01 10 0f 00 01 ................*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d22e0, buflen 285*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: SSL state = 0x21c0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: SSL_state_string=SSLv3 read finished A*spamApTask4: Dec 07 13:51:08.117: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:51:08.117: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d22e0 in status 3*spamApTask4: Dec 07 13:51:08.117: a0:93:51:76:e2:92 No Change Cipher Spec pending Cert Verify done state.*spamApTask4: Dec 07 13:51:08.117: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:51:08.117: a0:93:51:76:e2:92 Releasing lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 Called... for connection 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 Buffer length 91, alloc_len 95*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 record=ChangeCipherSpec epoch=0 seq=6*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 seq_num 6 epoch 0con->rx_seq 5 con->rx_epoch 0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 5 rx_epoch 0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 Got DTLS_RECORD_CHANGE_CIPHER_SPEC*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 Received CHANGE_CIPHER_SPEC in connStatus 3. processing...*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 DTLS_RECORD_CHANGE_CIPHER_SPEC can be processed*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 record length 1*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 record=Handshake epoch=1 seq=0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 1*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 updated con with rx_seq_valid 255 rx_seq 0 rx_epoch 1*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 msg=Unknown or Encrypted*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 record

2025-03-30

Add Comment