Kgon 92 3

Author: m | 2025-04-24

★★★★☆ (4.8 / 3736 reviews)

Download bitdefender uninstall tool for 2018 editions

A 2025 television ad for Portland's KGON FM 92. KGON 92.3 America Rocks Poster Portland Oregon Radio Rock Music Limited. Kgon 92 Fm Oregon Rock Station Decal. Rare Scorpions 2025 KGON Portland, Oregon Vintage Concert

is we transfer free

KGON FM 92 2025 TV commercial - YouTube

After 42 years with KGON (92.3-FM) radio, Iris Harrison retired from her mid-day show on Dec. 18. (Photo: Screenshot, KGON.com)By Kristi Turnquist | The Oregonian/OregonLiveIn the fast-moving word of radio, favorites can be on the air one day, and gone the next. But Iris Harrison, who worked at Portland’s KGON (92.3 FM) radio since March of 1977, is the exception. Harrison announced her plans to retire from her mid-day hosting spot on KGON back in September. And Dec. 18 marked her last shift in that on-air spot.As Harrison wrote on her Facebook page, on Dec. 18, “I got a call last night from Bob Ancheta, and he said ‘Are you ready?’ Yes, I’m ready! My last show on KGON is today, and while I haven’t planned anything big or special, there is a reason for that. It’s a gentle goodbye.”In a video posted on the KGON website in September, Harrison talked about her plans to retire in December. Harrison spoke about wanting to take a long-planned road trip with her husband, Marty Party, a fellow radio veteran, who’s now retired. She also mentioned wanting to have time to spend with her “three amazing granddaughters.”But Harrison emphasized that, even though she won’t be doing her regular duties at the classic rock station, she has plans for other projects, including podcasts drawing on her long history of interviews with rock artists and bands.Earlier this month, Harrison joined KGW’s Brenda Braxton for a video segment, in which the radio veteran recalled being 22 when she joined KGON. Harrison turned 65 on Dec. 6.According to the KGON website, Harrison, whose hometown is Monterey, California, moved to Oregon in 1974, and first became interested in working in radio while attending the University of Oregon. She started out working for a Eugene station with the call letters, KFMY, and moved to Portland when she was hired to work at KVAN, in 1976. Harrison went to work for KGON in 1977, and built an amazingly long career there. In 2012, she was inducted into the Oregon Music Hall of Fame.Her bio also says this about Harrison’s favorite 07 13:48:12.488: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d1f00 in status 1*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 Releasing lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Called... for connection 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Buffer length 283, alloc_len 287*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=4*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 seq_num 4 epoch 0con->rx_seq 3 con->rx_epoch 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 3 rx_epoch 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 msg=ClientKeyExchange len=258 seq=3 frag_off=0 frag_len=258*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Rcvd ClientKeyExchange in connStatus 1*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Received CLIENT_KEY_EXCHANGE in status 1. processing...*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 ClientKeyExchange can be processed*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 msg_seq:3,msg_len:258,frag_len:258,frag_off: 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Allow: ClientKeyExchange in status 2*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 record length 270*spamApTask4: Dec 07 13:48:12.489: 00000000: 16 fe fd 00 00 00 00 00 00 00 04 01 0e 10 00 01 ................*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d1f00, buflen 283*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:48:12.704: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d1f00 in status 2*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 No pending Cert Verify in Client Key Exchange done state.*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 Releasing lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 Called... for connection 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 Buffer length 285, alloc_len 289*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=5*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 seq_num 5 epoch 0con->rx_seq 4 con->rx_epoch 0*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 4 rx_epoch 0*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 msg=CertificateVerify len=260 seq=4 frag_off=0 frag_len=260*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92

92 FM KGON Radio And Unnatural Disco - Portland, OR Memories

A0:93:51:76:e2:92 Certificate verification - passed!*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Check for bufferred msgs - 0x1a4d22e0(1)*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d22e0 in status 1*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL state = 0x2180; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL_state_string=SSLv3 read client certificate A*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d22e0 in status 1*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Releasing lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Called... for connection 0x1a4d22e0*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Buffer length 283, alloc_len 287*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=4*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 seq_num 4 epoch 0con->rx_seq 3 con->rx_epoch 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 3 rx_epoch 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 msg=ClientKeyExchange len=258 seq=3 frag_off=0 frag_len=258*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Rcvd ClientKeyExchange in connStatus 1*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Received CLIENT_KEY_EXCHANGE in status 1. processing...*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 ClientKeyExchange can be processed*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 msg_seq:3,msg_len:258,frag_len:258,frag_off: 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Allow: ClientKeyExchange in status 2*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 record length 270*spamApTask4: Dec 07 13:51:07.765: 00000000: 16 fe fd 00 00 00 00 00 00 00 04 01 0e 10 00 01 ................*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d22e0, buflen 283*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d22e0 in status 2*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 No pending Cert Verify in Client Key Exchange done state.*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:51:07.980:. A 2025 television ad for Portland's KGON FM 92. KGON 92.3 America Rocks Poster Portland Oregon Radio Rock Music Limited. Kgon 92 Fm Oregon Rock Station Decal. Rare Scorpions 2025 KGON Portland, Oregon Vintage Concert

Vintage 2025 THE WHO ROCKs PORTLAND - KGON 92 FM

00000000: 16 fe fd 00 00 00 00 00 00 00 03 01 82 0b 00 03 ................*spamApTask4: Dec 07 13:49:11.027: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d20f0, buflen 399*spamApTask4: Dec 07 13:49:11.034: a0:93:51:76:e2:92 Certificate verification - passed!*spamApTask4: Dec 07 13:49:11.034: a0:93:51:76:e2:92 Check for bufferred msgs - 0x1a4d20f0(1)*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d20f0 in status 1*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: SSL state = 0x2180; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: SSL_state_string=SSLv3 read client certificate A*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.035: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d20f0 in status 1*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Releasing lock for 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Called... for connection 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Buffer length 283, alloc_len 287*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=4*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 seq_num 4 epoch 0con->rx_seq 3 con->rx_epoch 0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 3 rx_epoch 0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 msg=ClientKeyExchange len=258 seq=3 frag_off=0 frag_len=258*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Rcvd ClientKeyExchange in connStatus 1*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Received CLIENT_KEY_EXCHANGE in status 1. processing...*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 ClientKeyExchange can be processed*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 msg_seq:3,msg_len:258,frag_len:258,frag_off: 0*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Allow: ClientKeyExchange in status 2*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 record length 270*spamApTask4: Dec 07 13:49:11.035: 00000000: 16 fe fd 00 00 00 00 00 00 00 04 01 0e 10 00 01 ................*spamApTask4: Dec 07 13:49:11.035: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d20f0, buflen 283*spamApTask4: Dec 07 13:49:11.250: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:49:11.250: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.250: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.250: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:49:11.251: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:49:11.251: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.251: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.251: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:49:11.251: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:49:11.251: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for A0:93:51:76:e2:92 Releasing lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Called... for connection 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Buffer length 285, alloc_len 289*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=5*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 seq_num 5 epoch 0con->rx_seq 4 con->rx_epoch 0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 4 rx_epoch 0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 msg=CertificateVerify len=260 seq=4 frag_off=0 frag_len=260*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Rcvd CertificateVerify in connStatus 2*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Received CERTIFICATE_VERIFY in connStatus 2. processing...*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 CertificateVerify can be processed*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 msg_seq:4,msg_len:260,frag_len:260,frag_off: 0*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Allow: CertificateVerify in status 3*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 record length 272*spamApTask4: Dec 07 13:51:08.111: 00000000: 16 fe fd 00 00 00 00 00 00 00 05 01 10 0f 00 01 ................*spamApTask4: Dec 07 13:51:08.111: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d22e0, buflen 285*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: SSL state = 0x21c0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:08.117: openssl_shim_info_callback: SSL_state_string=SSLv3 read finished A*spamApTask4: Dec 07 13:51:08.117: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:51:08.117: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d22e0 in status 3*spamApTask4: Dec 07 13:51:08.117: a0:93:51:76:e2:92 No Change Cipher Spec pending Cert Verify done state.*spamApTask4: Dec 07 13:51:08.117: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:51:08.117: a0:93:51:76:e2:92 Releasing lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 Called... for connection 0x1a4d22e0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 Buffer length 91, alloc_len 95*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 record=ChangeCipherSpec epoch=0 seq=6*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 seq_num 6 epoch 0con->rx_seq 5 con->rx_epoch 0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 5 rx_epoch 0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 Got DTLS_RECORD_CHANGE_CIPHER_SPEC*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 Received CHANGE_CIPHER_SPEC in connStatus 3. processing...*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 DTLS_RECORD_CHANGE_CIPHER_SPEC can be processed*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 record length 1*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 record=Handshake epoch=1 seq=0*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 1*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 updated con with rx_seq_valid 255 rx_seq 0 rx_epoch 1*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 msg=Unknown or Encrypted*spamApTask4: Dec 07 13:51:08.118: a0:93:51:76:e2:92 record

KGON 92 FM Radio Station Pin Button - Bonanza

Con 0x1a4d20f0 in status 2*spamApTask4: Dec 07 13:49:11.251: a0:93:51:76:e2:92 No pending Cert Verify in Client Key Exchange done state.*spamApTask4: Dec 07 13:49:11.251: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:49:11.251: a0:93:51:76:e2:92 Releasing lock for 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 Called... for connection 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 Buffer length 285, alloc_len 289*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=5*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 seq_num 5 epoch 0con->rx_seq 4 con->rx_epoch 0*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 4 rx_epoch 0*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 msg=CertificateVerify len=260 seq=4 frag_off=0 frag_len=260*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 Rcvd CertificateVerify in connStatus 2*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 Received CERTIFICATE_VERIFY in connStatus 2. processing...*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 CertificateVerify can be processed*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 msg_seq:4,msg_len:260,frag_len:260,frag_off: 0*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 Allow: CertificateVerify in status 3*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 record length 272*spamApTask4: Dec 07 13:49:11.387: 00000000: 16 fe fd 00 00 00 00 00 00 00 05 01 10 0f 00 01 ................*spamApTask4: Dec 07 13:49:11.387: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d20f0, buflen 285*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: SSL state = 0x21c0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:49:11.394: openssl_shim_info_callback: SSL_state_string=SSLv3 read finished A*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d20f0 in status 3*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 No Change Cipher Spec pending Cert Verify done state.*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 Releasing lock for 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 Called... for connection 0x1a4d20f0*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 Buffer length 91, alloc_len 95*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 record=ChangeCipherSpec epoch=0 seq=6*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 seq_num 6 epoch 0con->rx_seq 5 con->rx_epoch 0*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 5 rx_epoch 0*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 Got DTLS_RECORD_CHANGE_CIPHER_SPEC*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 Received CHANGE_CIPHER_SPEC in connStatus 3. processing...*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 DTLS_RECORD_CHANGE_CIPHER_SPEC can be processed*spamApTask4: Dec 07 13:49:11.394: a0:93:51:76:e2:92 record length 1*spamApTask4: Dec 07 13:49:11.395: a0:93:51:76:e2:92 record=Handshake epoch=1 seq=0*spamApTask4: Dec 07 13:49:11.395: a0:93:51:76:e2:92 con->rx_seq_valid

Vintage KGON 92 FM buttons. Portland Oregon - craigslist

Rcvd CertificateVerify in connStatus 2*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 Received CERTIFICATE_VERIFY in connStatus 2. processing...*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 CertificateVerify can be processed*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 msg_seq:4,msg_len:260,frag_len:260,frag_off: 0*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 Allow: CertificateVerify in status 3*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 record length 272*spamApTask4: Dec 07 13:48:12.849: 00000000: 16 fe fd 00 00 00 00 00 00 00 05 01 10 0f 00 01 ................*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d1f00, buflen 285*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: SSL state = 0x21c0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.855: openssl_shim_info_callback: SSL_state_string=SSLv3 read finished A*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d1f00 in status 3*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 No Change Cipher Spec pending Cert Verify done state.*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 Releasing lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 Called... for connection 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 Buffer length 91, alloc_len 95*spamApTask4: Dec 07 13:48:12.855: a0:93:51:76:e2:92 record=ChangeCipherSpec epoch=0 seq=6*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 seq_num 6 epoch 0con->rx_seq 5 con->rx_epoch 0*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 5 rx_epoch 0*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 Got DTLS_RECORD_CHANGE_CIPHER_SPEC*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 Received CHANGE_CIPHER_SPEC in connStatus 3. processing...*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 DTLS_RECORD_CHANGE_CIPHER_SPEC can be processed*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 record length 1*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 record=Handshake epoch=1 seq=0*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 1*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 updated con with rx_seq_valid 255 rx_seq 0 rx_epoch 1*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 msg=Unknown or Encrypted*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 record length 64*spamApTask4: Dec 07 13:48:12.856: 00000000: 14 fe fd 00 00 00 00 00 00 00 06 00 01 01 16 fe ................*spamApTask4: Dec 07 13:48:12.856: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d1f00, buflen 91*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: SSL state = 0x21c0; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: SSL_state_string=SSLv3 read finished A*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: SSL state = 0x21d0; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.857: openssl_shim_info_callback: SSL_state_string=SSLv3 write change cipher spec A*spamApTask4: Dec. A 2025 television ad for Portland's KGON FM 92.

92.3 KGON (KGON) Portland, OR - Listen Live

Điện thoại, in trực tiếp từ USB ko cần máy tính. Mực in rẻ. , công suất in cực lớn 20.000/ 1 tháng Máy in Hp Laser Pro m401DN cũ Giá: 2,800,000VNĐ Bảo hành: 6 thángMáy còn: 92%. Máy in 2 mặt, có card Lan, in từ điện thoại, in từ USB ko cần máy tính. Công suất in lớn 30.000/ 1 tháng. Tốc độ in nhanh, màn hình cảm ứng, máy đẹp, vận hành êm Máy in Hp Pro m401n cũ Giá: 2,200,000VNĐ Bảo hành: 6 thángMáy còn: 92-95%. Máy in văn phòng khổ giấy A4 A5, In đen trắng 1 mặt, máy in A5 rất nhanh, thiết kế sang trọng, hộp mực lớn, bản in cực đẹp, mực in rẻ.. Máy in Canon LBP 2900 cũ Giá: 2,200,000VNĐ Bảo hành: 6 thángMáy còn: 92%. Máy in đen trắng A4, Máy nhỏ gọn trắng đẹp nguyên Zin, hộp mực lớn 12A, bản in rõ nét, máy rất bền, mực in rẻ... Máy in Wifi 2 mặt Hp Pro M401dw cũ Giá: 3,200,000VNĐ Bảo hành: 6 thángMáy còn: 92%. Máy in wifi 2 mặt, tốc độ in nhanh, màn hình cảm ứng, kết nối in wifi từ máy tính và điện thoại rất tiện lợi, khổ giấy in A4 A5, dùng hộp mực 80A mực in rẻ Máy in 2 mặt Hp Pro m401dne cũ Giá: 2,500,000VNĐ Bảo hành: 6 thángMáy còn: 92%. Máy in Laser A4, In đen trắng, tốc độ nhanh, in 2 mặt, in mạng Lan, bản in cực đẹp, công suất in cực lớn 30.000/ 1 tháng Máy in Wifi Xerox P115w cũ Giá: 1,500,000VNĐ Bảo hành: 3 thángMáy còn: 92%. Máy in A4 A5, in đen trắng 1 mặt, kết nối máy tính qua cáp USB & Wifi, in từ máy tính và điện thoại rất tiện lợi. Máy in Hp laserjet P1505 cũ Giá: 1,400,000VNĐ Bảo hành: 6 thángMáy còn: 92%. Máy in laser đen trắng A4, thiết kế nhỏ gọn, tốc độ in nhanh, bản in rõ đẹp, mực in rẻ... Máy in 2 mặt Brother HL 2361dn cũ Giá: 2,300,000VNĐ Bảo hành: 3 thángMáy còn: 92%. Máy in 2 mặt, in qua điện thoại, in đen trắng A4 A5, thiết kế nhỏ gọn, bản in rõ nét, mực in rẻ Máy in HP Laser P2035N cũ Giá: 1,600,000VNĐ Bảo hành: 6 thángMáy còn: 92%. Máy in đen trắng A4, tốc độ in nhanh, bản in rõ nét, hộp mực lớn, giá nạp mực rẻ, Kết nối USB + LAN, máy trắng đẹp Máy in HP Laserjet P2035 Giá: 1,400,000VNĐ Bảo hành: 3 thángMáy còn: 92%. Máy in đen trắng A4, tốc độ in nhanh, bản in rõ nét, hộp mực lớn, giá nạp mực rẻ, máy trắng đẹp Máy in 2 mặt HP Laserjet P3015DN cũ Giá: 3,200,000VNĐ Bảo hành: 3 thángMáy còn: 92%. Dòng máy in A4 công nghiệp, tốc độ cực nhanh, in 2 mặt tự động, In Mạng Lan, công suất 100.000 bản 1 tháng. mực in rẻ Máy

Comments

User8886

After 42 years with KGON (92.3-FM) radio, Iris Harrison retired from her mid-day show on Dec. 18. (Photo: Screenshot, KGON.com)By Kristi Turnquist | The Oregonian/OregonLiveIn the fast-moving word of radio, favorites can be on the air one day, and gone the next. But Iris Harrison, who worked at Portland’s KGON (92.3 FM) radio since March of 1977, is the exception. Harrison announced her plans to retire from her mid-day hosting spot on KGON back in September. And Dec. 18 marked her last shift in that on-air spot.As Harrison wrote on her Facebook page, on Dec. 18, “I got a call last night from Bob Ancheta, and he said ‘Are you ready?’ Yes, I’m ready! My last show on KGON is today, and while I haven’t planned anything big or special, there is a reason for that. It’s a gentle goodbye.”In a video posted on the KGON website in September, Harrison talked about her plans to retire in December. Harrison spoke about wanting to take a long-planned road trip with her husband, Marty Party, a fellow radio veteran, who’s now retired. She also mentioned wanting to have time to spend with her “three amazing granddaughters.”But Harrison emphasized that, even though she won’t be doing her regular duties at the classic rock station, she has plans for other projects, including podcasts drawing on her long history of interviews with rock artists and bands.Earlier this month, Harrison joined KGW’s Brenda Braxton for a video segment, in which the radio veteran recalled being 22 when she joined KGON. Harrison turned 65 on Dec. 6.According to the KGON website, Harrison, whose hometown is Monterey, California, moved to Oregon in 1974, and first became interested in working in radio while attending the University of Oregon. She started out working for a Eugene station with the call letters, KFMY, and moved to Portland when she was hired to work at KVAN, in 1976. Harrison went to work for KGON in 1977, and built an amazingly long career there. In 2012, she was inducted into the Oregon Music Hall of Fame.Her bio also says this about Harrison’s favorite

2025-04-07
User2499

07 13:48:12.488: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d1f00 in status 1*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 Releasing lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:48:12.488: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Called... for connection 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Buffer length 283, alloc_len 287*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=4*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 seq_num 4 epoch 0con->rx_seq 3 con->rx_epoch 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 3 rx_epoch 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 msg=ClientKeyExchange len=258 seq=3 frag_off=0 frag_len=258*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Rcvd ClientKeyExchange in connStatus 1*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Received CLIENT_KEY_EXCHANGE in status 1. processing...*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 ClientKeyExchange can be processed*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 msg_seq:3,msg_len:258,frag_len:258,frag_off: 0*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Allow: ClientKeyExchange in status 2*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 record length 270*spamApTask4: Dec 07 13:48:12.489: 00000000: 16 fe fd 00 00 00 00 00 00 00 04 01 0e 10 00 01 ................*spamApTask4: Dec 07 13:48:12.489: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d1f00, buflen 283*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:48:12.704: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:48:12.704: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d1f00 in status 2*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 No pending Cert Verify in Client Key Exchange done state.*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:48:12.705: a0:93:51:76:e2:92 Releasing lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 Called... for connection 0x1a4d1f00*spamApTask4: Dec 07 13:48:12.848: a0:93:51:76:e2:92 Buffer length 285, alloc_len 289*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=5*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 seq_num 5 epoch 0con->rx_seq 4 con->rx_epoch 0*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 4 rx_epoch 0*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92 msg=CertificateVerify len=260 seq=4 frag_off=0 frag_len=260*spamApTask4: Dec 07 13:48:12.849: a0:93:51:76:e2:92

2025-04-21
User5707

A0:93:51:76:e2:92 Certificate verification - passed!*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Check for bufferred msgs - 0x1a4d22e0(1)*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d22e0 in status 1*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL state = 0x2180; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL_state_string=SSLv3 read client certificate A*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.764: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d22e0 in status 1*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 No pending Client Key Exchange in Cert Verify Passed state.*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Releasing lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 DTLS connection find by 0x10e7908c with Local 10.15.152.5:5246 Peer 10.15.102.11:5272*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 DTLS connection found! Acquiring lock for 0x1a4d22e0*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Called... for connection 0x1a4d22e0*spamApTask4: Dec 07 13:51:07.764: a0:93:51:76:e2:92 Buffer length 283, alloc_len 287*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 record=Handshake epoch=0 seq=4*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 con->rx_seq_valid 255 con->rx_epoch 0 epoch 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 seq_num 4 epoch 0con->rx_seq 3 con->rx_epoch 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 con rx_seq_valid 255 rx_seq 3 rx_epoch 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 msg=ClientKeyExchange len=258 seq=3 frag_off=0 frag_len=258*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Rcvd ClientKeyExchange in connStatus 1*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Received CLIENT_KEY_EXCHANGE in status 1. processing...*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 ClientKeyExchange can be processed*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 local_openssl_dtls_handshake_replay_detection:*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 msg_seq:3,msg_len:258,frag_len:258,frag_off: 0*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Allow: ClientKeyExchange in status 2*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 record length 270*spamApTask4: Dec 07 13:51:07.765: 00000000: 16 fe fd 00 00 00 00 00 00 00 04 01 0e 10 00 01 ................*spamApTask4: Dec 07 13:51:07.765: a0:93:51:76:e2:92 Calling BIO_write! 0x1a4d22e0, buflen 283*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL state = 0x2190; where = 0x2001; ret = 0x1*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL_state_string=SSLv3 read client key exchange A*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL state = 0x21a0; where = 0x2002; ret = 0xffffffff*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_type_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: ret_desc_string=unknown*spamApTask4: Dec 07 13:51:07.980: openssl_shim_info_callback: SSL_state_string=SSLv3 read certificate verify A*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 Handshake in progress... check for bufferred msgs*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 checkAndHandleBufferredMsgs called for con 0x1a4d22e0 in status 2*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 No pending Cert Verify in Client Key Exchange done state.*spamApTask4: Dec 07 13:51:07.980: a0:93:51:76:e2:92 No data to send*spamApTask4: Dec 07 13:51:07.980:

2025-04-16

Add Comment