2.11.6 resume test fails on powerpc s390 and sparc

Andreas Metzler ametzler at downhill.at.eu.org
Tue Feb 22 20:11:29 CET 2011


On 2011-02-20 Nikos Mavrogiannopoulos <nmav at gnutls.org> wrote:
> On 02/20/2011 08:06 PM, Andreas Metzler wrote:
[...] 
> > I started, but have given up for now since git is incompilable most of
> > the time. (Really, out of a dozen git bisects there are 10 unbuildable
> > checkouts.)
> > 
> > The bug is absent in the last 2.9. release
> > but present in 2.11.0.
> > 
> > I will revisit when I have hours to spare again.

Status update:
eb3dc6ff292de8f40427e8ebb702aa7c2e5bdee8 bad.
9fd9ba397442fa0d593766e1ae396e589abf4c41 good.

I have not yet found a version on HEAD in between that compiled.


> Could you provide the output of the "resume -v"? It might help
> locating the issue.


see below.

thanks, cu andreas


try to resume from db
server: ready. Listening to port '5556'.
server |<2>| ASSERT: pkcs11.c:337
client |<2>| ASSERT: pkcs11.c:337
client |<2>| Cannot load /etc/gnutls/pkcs11.conf
server |<2>| Cannot load /etc/gnutls/pkcs11.conf
Launched, generating DH parameters...
server: connection from 127.0.0.1, port 39272
client |<2>| EXT[0x40ecf8]: Sending extension CERT TYPE (3 bytes)
client |<2>| EXT[0x40ecf8]: Sending extension SAFE RENEGOTIATION (1 bytes)
client |<2>| EXT[0x40ecf8]: Sending extension SIGNATURE ALGORITHMS (12 bytes)
server |<2>| ASSERT: gnutls_db.c:326
server |<2>| ASSERT: gnutls_db.c:246
server |<2>| EXT[0x415be8]: Found extension 'CERT TYPE/9'
server |<2>| EXT[0x415be8]: Found extension 'SAFE RENEGOTIATION/65281'
server |<2>| EXT[0x415be8]: Found extension 'SIGNATURE ALGORITHMS/13'
server |<2>| EXT[0x415be8]: Found extension 'CERT TYPE/9'
server |<2>| EXT[0x415be8]: Found extension 'SAFE RENEGOTIATION/65281'
server |<2>| EXT[0x415be8]: Found extension 'SIGNATURE ALGORITHMS/13'
server |<2>| EXT[0x415be8]: Found extension 'CERT TYPE/9'
server |<2>| ASSERT: ext_cert_type.c:127
server |<2>| ASSERT: ext_cert_type.c:127
server |<2>| ASSERT: ext_cert_type.c:144
server |<2>| EXT[0x415be8]: Found extension 'SAFE RENEGOTIATION/65281'
server |<2>| EXT[0x415be8]: Found extension 'SIGNATURE ALGORITHMS/13'
server |<2>| EXT[0x415be8]: Sending extension SAFE RENEGOTIATION (1 bytes)
client |<2>| EXT[0x40ecf8]: Found extension 'SAFE RENEGOTIATION/65281'
client |<2>| ASSERT: ext_session_ticket.c:722
resume db storing... (32-492)
client: Handshake was completed
key:
43 14 b6 ec 47 70 a8 33 ff 00 7f 24 29 52 08 db
a4 85 86 8e 5d 0d a0 b3 a1 00 6f 94 46 0f fd 74

data:
02 00 00 01 13 00 00 03 ff 00 00 00 81 00 b6 4c
70 da 39 6c 54 2b 2b 7c ba b1 ac df 88 ac 5f f7
5b cb d5 16 f0 f3 61 b2 e6 c6 2d 86 42 ff 6c fc
f4 06 58 fd 5d f6 2d b6 3f 60 e9 ad f7 09 92 75
ad ec a8 42 23 54 9a 62 c7 8e 40 82 08 01 83 fb
f0 27 f2 22 91 92 71 6f ef 4b c9 21 af 0d 2b 95
08 b2 78 2b d0 80 5d ce 19 e1 8e 13 2c 1c c3 ea
10 4f 84 a6 14 e0 fb 1f 4b 26 25 ed 82 37 28 d8
a5 ec 41 5d 0f c0 d2 66 d3 17 d4 0a 9b 57 00 00
00 01 05 00 00 00 81 00 97 b2 b4 bb a5 54 4a 84
3f ba 6d b1 5e eb 90 32 66 1b 6b ef 5e fe ff fb
e2 89 2a f4 53 66 d5 90 f8 2f 29 b6 08 ae 22 ea
d1 a8 4c 9b a1 81 8c 36 db 52 4e 6d 48 b5 1d 0b
8a 8b 63 1c 56 f7 40 f1 00 22 0a 74 2a ca e4 4b
fb 9e ae 70 44 0a 12 2b 62 3b e6 72 75 0a 10 7d
10 cf bd b1 81 4f 55 ea d8 c4 bb 5c 08 61 b4 3c
f9 87 61 3b 80 44 0e 85 04 3d b2 12 fd cf 92 c8
d9 5a 8e 7d f0 1b 0d df 00 00 00 ac 00 00 00 00
00 00 00 00 00 6c 00 00 23 13 31 53 47 06 5e 99
61 80 f0 fb b2 b4 b0 cd d2 91 4f 0f 4f f6 32 f8
24 52 a5 cb 15 7d 54 1c 51 58 e8 58 3d 5b c1 9c
0d 1f 04 dc 73 08 7f 78 4d 64 08 33 48 b2 16 02
81 2f c6 2b c3 58 98 ce 23 57 03 bd 14 a6 ea d5
b8 f0 84 65 24 20 70 5f 4d 64 08 33 3f 8c 1f f9
ac ca d5 de 01 97 81 37 a7 5d 46 0c 38 7a 08 f1
e4 e5 96 42 e6 9b a2 eb 00 00 00 20 00 00 40 00
00 00 40 00 43 14 b6 ec 47 70 a8 33 ff 00 7f 24
29 52 08 db a4 85 86 8e 5d 0d a0 b3 a1 00 6f 94
46 0f fd 74 4d 64 08 33 00 00 00 01 00 00 00 0d
00 00 00 18 00 00 00 05 00 00 00 01 00 00 00 02
00 00 00 06 00 00 00 07 00 00 00 08
server: Handshake was completed
- Received 9 bytes: Hello TLS
server: Peer has closed the GnuTLS connection
server: connection from 127.0.0.1, port 39273
client |<2>| ASSERT: gnutls_handshake.c:1981
client |<2>| ASSERT: gnutls_handshake.c:2630
client: Handshake failed
GnuTLS error: GnuTLS internal error.
server |<2>| ASSERT: gnutls_buffers.c:634
server |<2>| ASSERT: gnutls_record.c:911
server |<2>| ASSERT: gnutls_handshake.c:2857
server: Handshake has failed (A TLS packet with unexpected length was received.)

global stop
try to resume from session ticket
server: ready. Listening to port '5556'.




More information about the Gnutls-devel mailing list