Hi Sam Sam,
I am trying to reproduce the issues you have reported. For now I would like to try using only wolfSSL, we can add CURL in later.
I have configured wolfSSL using:
$ ./configure --enable-all
I am able to connect to the "www.tvnow.de" host using the example client:
$ ./examples/client/client -h 217.118.168.60 -p 443 -d -x -C -g -i
peer's cert info:
issuer : /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA
subject: /OU=Domain Control Validated/OU=PositiveSSL Wildcard/CN=*.tvnow.de
altname = tvnow.de
altname = *.tvnow.de
serial number:1c:6b:0d:e8:9a:44:80:03:c3:a1:0e:03:bd:8e:6a:92
SSL version is TLSv1.2
SSL cipher suite is TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
SSL curve name is SECP256R1
Client Random : C70D72DD1A0B6FD211139FF47EF63367DB43A16D7A3AC3807CF5C8649B4B1021
SSL connect ok, sending GET...
HTTP/1.0 302 Found
Location: https://www.tvnow.de/index.html
Server: BigIP
C
onnection: close
Content-Length: 0
Also, I can specify the SSL version with the "-v <num>" option:
./examples/client/client -h 217.118.168.60 -p 443 -d -x -C -g -i -v 2
./examples/client/client -h 217.118.168.60 -p 443 -d -x -C -g -i -v 3
Only the values 2 and 3 for SSL version are successful with that host.
Does this match your results so far?
Thanks,
Eric Blankenhorn
wolfSSL Support