dtls-stress on s390x
Andreas Metzler
ametzler at downhill.at.eu.org
Sun Jun 17 11:57:32 CEST 2012
Hello,
the dtls test of 3.0.20 (and .19, now too) fails on S390x. Any idea what's
wrong?
Find attached a log of
./dtls-stress -d 4712 -shello 021 -sfinished 01 -cfinished 012 SKeyExchange CKeyExchange CFinished
cu andreas
--
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'
-------------- next part --------------
3030 server|<4> REC[0x80024de0]: Allocating epoch #0
3030 server|<2> ASSERT: gnutls_constate.c:717
3030 server|<4> REC[0x80024de0]: Allocating epoch #1
3030 client|<4> REC[0x80024de0]: Allocating epoch #0
3030 client|<2> ASSERT: gnutls_constate.c:717
3030 client|<4> REC[0x80024de0]: Allocating epoch #1
3030 client|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
3030 client|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256
3030 client|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256
3030 client|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
3030 client|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384
3030 client|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
3030 client|<3> HSK[0x80024de0]: Keeping ciphersuite: ECDH_ANON_AES_128_CBC_SHA1 (C0.18)
3030 client|<3> HSK[0x80024de0]: Keeping ciphersuite: ECDH_ANON_AES_256_CBC_SHA1 (C0.19)
3030 client|<3> HSK[0x80024de0]: Keeping ciphersuite: ECDH_ANON_3DES_EDE_CBC_SHA1 (C0.17)
3030 client|<3> EXT[0x80024de0]: Sending extension CERT TYPE (3 bytes)
3030 client|<3> EXT[0x80024de0]: Sending extension SAFE RENEGOTIATION (1 bytes)
3030 client|<3> EXT[0x80024de0]: Sending extension SUPPORTED ECC (12 bytes)
3030 client|<3> EXT[0x80024de0]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
3030 client|<3> HSK[0x80024de0]: CLIENT HELLO was queued [94 bytes]
3030 client|<7> HWRITE: enqueued [CLIENT HELLO] 94. Total 94 bytes.
3030 client|<7> HWRITE FLUSH: 94 bytes in buffer.
3030 client|<6> DTLS[0x80024de0]: Start of flight transmission.
3030 client|<6> DTLS[0x80024de0]: Sending Packet[0] fragment CLIENT HELLO(1) with length: 82, offset: 0, fragment length: 82
3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 94
3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 client|<7> WRITE: enqueued 107 bytes for 0x4. Total 107 bytes.
3030 client|<4> REC[0x80024de0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 107
3030 client|<7> WRITE FLUSH: 107 bytes in buffer.
3030 client|<7> WRITE: wrote 107 bytes, 0 bytes left.
3030 server|<2> ASSERT: gnutls_buffers.c:978
3030 server|<7> READ: Got 107 bytes from 0x5
3030 server|<7> READ: read 107 bytes from 0x5
3030 server|<7> RB: Have 0 bytes into buffer. Adding 107 bytes.
3030 server|<7> RB: Requested 13 bytes
3030 server|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 94
3030 server|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 server|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 94
3030 server|<4> REC[0x80024de0]: Decrypted Packet[0.0] Handshake(22) with length: 94
3030 server|<6> BUF[REC]: Inserted 94 bytes of Data(22)
3030 server|<3> HSK[0x80024de0]: CLIENT HELLO was received. Length 82[82], frag offset 0, frag length: 82, sequence: 0
3030 server|<3> HSK[0x80024de0]: Client's version: 254.255
3030 server|<2> ASSERT: gnutls_db.c:289
3030 server|<3> EXT[0x80024de0]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
3030 server|<3> EXT[0x80024de0]: Parsing extension 'CERT TYPE/9' (3 bytes)
3030 server|<2> ASSERT: cert_type.c:125
3030 server|<2> ASSERT: cert_type.c:125
3030 server|<2> ASSERT: cert_type.c:142
3030 server|<3> EXT[0x80024de0]: Parsing extension 'SUPPORTED ECC/10' (12 bytes)
3030 server|<3> HSK[0x80024de0]: Selected ECC curve SECP192R1 (5)
3030 server|<3> EXT[0x80024de0]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes)
3030 server|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
3030 server|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256
3030 server|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256
3030 server|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
3030 server|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384
3030 server|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
3030 server|<3> HSK[0x80024de0]: Keeping ciphersuite: ECDH_ANON_AES_128_CBC_SHA1 (C0.18)
3030 server|<3> HSK[0x80024de0]: Keeping ciphersuite: ECDH_ANON_AES_256_CBC_SHA1 (C0.19)
3030 server|<3> HSK[0x80024de0]: Keeping ciphersuite: ECDH_ANON_3DES_EDE_CBC_SHA1 (C0.17)
3030 server|<3> HSK[0x80024de0]: Requested cipher suites[size: 6]:
3030 server|<3> 0xc0, 0x18 ECDH_ANON_AES_128_CBC_SHA1
3030 server|<3> HSK[0x80024de0]: Selected cipher suite: ECDH_ANON_AES_128_CBC_SHA1
3030 server|<3> HSK[0x80024de0]: Selected Compression Method: NULL
3030 server|<3> HSK[0x80024de0]: Safe renegotiation succeeded
3030 server|<3> EXT[0x80024de0]: Sending extension SAFE RENEGOTIATION (1 bytes)
3030 server|<3> EXT[0x80024de0]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
3030 server|<3> HSK[0x80024de0]: SessionID: e1542ba17a62e7db26d9ab75ff5230d52840b03a82204fdfa57ec80e2af3f84b
3030 server|<3> HSK[0x80024de0]: SERVER HELLO was queued [95 bytes]
3030 server|<7> HWRITE: enqueued [SERVER HELLO] 95. Total 95 bytes.
3030 server|<3> HSK[0x80024de0]: SERVER KEY EXCHANGE was queued [65 bytes]
3030 server|<7> HWRITE: enqueued [SERVER KEY EXCHANGE] 65. Total 160 bytes.
3030 server|<3> HSK[0x80024de0]: SERVER HELLO DONE was queued [12 bytes]
3030 server|<7> HWRITE: enqueued [SERVER HELLO DONE] 12. Total 172 bytes.
3030 server|<7> HWRITE FLUSH: 172 bytes in buffer.
3030 server|<6> DTLS[0x80024de0]: Start of flight transmission.
3030 server|<6> DTLS[0x80024de0]: Sending Packet[0] fragment SERVER HELLO(2) with length: 83, offset: 0, fragment length: 83
3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 95
3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 server|<7> WRITE: enqueued 108 bytes for 0x5. Total 108 bytes.
3030 server|<4> REC[0x80024de0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 108
3030 server|<6> DTLS[0x80024de0]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 53, offset: 0, fragment length: 53
3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 65
3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 server|<7> WRITE: enqueued 78 bytes for 0x5. Total 186 bytes.
3030 server|<4> REC[0x80024de0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 78
3030 server|<6> DTLS[0x80024de0]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0
3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 12
3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 server|<7> WRITE: enqueued 25 bytes for 0x5. Total 211 bytes.
3030 server|<4> REC[0x80024de0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 25
3030 server|<7> WRITE FLUSH: 211 bytes in buffer.
3030 client|<7> READ: Got 108 bytes from 0x4
3030 client|<7> READ: read 108 bytes from 0x4
3030 client|<7> RB: Have 0 bytes into buffer. Adding 108 bytes.
3030 client|<7> RB: Requested 13 bytes
3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 95
3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 95
3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.0] Handshake(22) with length: 95
3030 client|<6> BUF[REC]: Inserted 95 bytes of Data(22)
3030 client|<3> HSK[0x80024de0]: SERVER HELLO was received. Length 83[83], frag offset 0, frag length: 83, sequence: 0
3030 client|<6> DTLS[0x80024de0]: End of flight transmission.
3030 client|<2> ASSERT: gnutls_buffers.c:945
3030 client|<2> ASSERT: gnutls_buffers.c:1150
3030 client|<2> ASSERT: gnutls_buffers.c:1150
3030 client|<3> HSK[0x80024de0]: Server's version: 254.255
3030 client|<3> HSK[0x80024de0]: SessionID length: 32
3030 client|<3> HSK[0x80024de0]: SessionID: e1542ba17a62e7db26d9ab75ff5230d52840b03a82204fdfa57ec80e2af3f84b
3030 client|<3> HSK[0x80024de0]: Selected cipher suite: ECDH_ANON_AES_128_CBC_SHA1
3030 client|<3> HSK[0x80024de0]: Selected compression method: NULL (0)
3030 client|<3> EXT[0x80024de0]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
3030 client|<3> EXT[0x80024de0]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes)
3030 client|<3> HSK[0x80024de0]: Safe renegotiation succeeded
3030 server| dropping ServerKeyExchange
3030 server|<7> WRITE: wrote 211 bytes, 0 bytes left.
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 client|<7> READ: Got 25 bytes from 0x4
3030 client|<7> READ: read 25 bytes from 0x4
3030 client|<7> RB: Have 0 bytes into buffer. Adding 25 bytes.
3030 client|<7> RB: Requested 13 bytes
3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 12
3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 12
3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.2] Handshake(22) with length: 12
3030 client|<6> BUF[REC]: Inserted 12 bytes of Data(22)
3030 client|<3> HSK[0x80024de0]: SERVER HELLO DONE was received. Length 0[0], frag offset 0, frag length: 1, sequence: 2
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 client|<2> ASSERT: gnutls_kx.c:475
3030 server|<6> DTLS[0x80024de0]: re-Start of flight transmission.
3030 server|<6> DTLS[0x80024de0]: Sending Packet[0] fragment SERVER HELLO(2) with length: 83, offset: 0, fragment length: 83
3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 95
3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 server|<7> WRITE: enqueued 108 bytes for 0x5. Total 108 bytes.
3030 server|<4> REC[0x80024de0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 108
3030 server|<6> DTLS[0x80024de0]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 53, offset: 0, fragment length: 53
3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 65
3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 server|<7> WRITE: enqueued 78 bytes for 0x5. Total 186 bytes.
3030 server|<4> REC[0x80024de0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 78
3030 server|<6> DTLS[0x80024de0]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0
3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 12
3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 server|<7> WRITE: enqueued 25 bytes for 0x5. Total 211 bytes.
3030 server|<4> REC[0x80024de0]: Sent Packet[6] Handshake(22) in epoch 0 and length: 25
3030 server|<7> WRITE FLUSH: 211 bytes in buffer.
3030 server| dropping ServerKeyExchange
3030 server|<7> WRITE: wrote 211 bytes, 0 bytes left.
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 client|<7> READ: Got 108 bytes from 0x4
3030 client|<7> READ: read 108 bytes from 0x4
3030 client|<7> RB: Have 0 bytes into buffer. Adding 108 bytes.
3030 client|<7> RB: Requested 13 bytes
3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 95
3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 95
3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.3] Handshake(22) with length: 95
3030 client|<6> BUF[REC]: Inserted 95 bytes of Data(22)
3030 client|<3> HSK[0x80024de0]: SERVER HELLO was received. Length 83[83], frag offset 0, frag length: 83, sequence: 0
3030 client| Discarded replayed handshake packet with sequence 0
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 client|<2> ASSERT: gnutls_kx.c:475
3030 server|<7> WRITE FLUSH: 0 bytes in buffer.
3030 server|<2> ASSERT: gnutls_buffers.c:575
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 client|<7> READ: Got 25 bytes from 0x4
3030 client|<7> READ: read 25 bytes from 0x4
3030 client|<7> RB: Have 0 bytes into buffer. Adding 25 bytes.
3030 client|<7> RB: Requested 13 bytes
3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 12
3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 12
3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.5] Handshake(22) with length: 12
3030 client|<6> BUF[REC]: Inserted 12 bytes of Data(22)
3030 client|<3> HSK[0x80024de0]: SERVER HELLO DONE was received. Length 0[0], frag offset 0, frag length: 1, sequence: 2
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 client|<2> ASSERT: gnutls_kx.c:475
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 server|<6> DTLS[0x80024de0]: re-Start of flight transmission.
3030 server|<6> DTLS[0x80024de0]: Sending Packet[0] fragment SERVER HELLO(2) with length: 83, offset: 0, fragment length: 83
3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 95
3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 server|<7> WRITE: enqueued 108 bytes for 0x5. Total 108 bytes.
3030 server|<4> REC[0x80024de0]: Sent Packet[7] Handshake(22) in epoch 0 and length: 108
3030 server|<6> DTLS[0x80024de0]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 53, offset: 0, fragment length: 53
3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 65
3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 server|<7> WRITE: enqueued 78 bytes for 0x5. Total 186 bytes.
3030 server|<4> REC[0x80024de0]: Sent Packet[8] Handshake(22) in epoch 0 and length: 78
3030 server|<6> DTLS[0x80024de0]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0
3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 12
3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 server|<7> WRITE: enqueued 25 bytes for 0x5. Total 211 bytes.
3030 server|<4> REC[0x80024de0]: Sent Packet[9] Handshake(22) in epoch 0 and length: 25
3030 server|<7> WRITE FLUSH: 211 bytes in buffer.
3030 client|<7> READ: Got 108 bytes from 0x4
3030 client|<7> READ: read 108 bytes from 0x4
3030 client|<7> RB: Have 0 bytes into buffer. Adding 108 bytes.
3030 client|<7> RB: Requested 13 bytes
3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 95
3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 95
3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.6] Handshake(22) with length: 95
3030 client|<6> BUF[REC]: Inserted 95 bytes of Data(22)
3030 client|<3> HSK[0x80024de0]: SERVER HELLO was received. Length 83[83], frag offset 0, frag length: 83, sequence: 0
3030 client| Discarded replayed handshake packet with sequence 0
3030 server| dropping ServerKeyExchange
3030 server|<7> WRITE: wrote 211 bytes, 0 bytes left.
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 client|<2> ASSERT: gnutls_kx.c:475
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 client|<7> READ: Got 25 bytes from 0x4
3030 client|<7> READ: read 25 bytes from 0x4
3030 client|<7> RB: Have 0 bytes into buffer. Adding 25 bytes.
3030 client|<7> RB: Requested 13 bytes
3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 12
3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 12
3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.8] Handshake(22) with length: 12
3030 client|<6> BUF[REC]: Inserted 12 bytes of Data(22)
3030 client|<3> HSK[0x80024de0]: SERVER HELLO DONE was received. Length 0[0], frag offset 0, frag length: 1, sequence: 2
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 client|<2> ASSERT: gnutls_kx.c:475
3030 server|<7> WRITE FLUSH: 0 bytes in buffer.
3030 server|<2> ASSERT: gnutls_buffers.c:575
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 server|<6> DTLS[0x80024de0]: re-Start of flight transmission.
3030 server|<6> DTLS[0x80024de0]: Sending Packet[0] fragment SERVER HELLO(2) with length: 83, offset: 0, fragment length: 83
3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 95
3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 server|<7> WRITE: enqueued 108 bytes for 0x5. Total 108 bytes.
3030 server|<4> REC[0x80024de0]: Sent Packet[10] Handshake(22) in epoch 0 and length: 108
3030 server|<6> DTLS[0x80024de0]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 53, offset: 0, fragment length: 53
3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 65
3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 server|<7> WRITE: enqueued 78 bytes for 0x5. Total 186 bytes.
3030 server|<4> REC[0x80024de0]: Sent Packet[11] Handshake(22) in epoch 0 and length: 78
3030 server|<6> DTLS[0x80024de0]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0
3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 12
3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 server|<7> WRITE: enqueued 25 bytes for 0x5. Total 211 bytes.
3030 server|<4> REC[0x80024de0]: Sent Packet[12] Handshake(22) in epoch 0 and length: 25
3030 server|<7> WRITE FLUSH: 211 bytes in buffer.
3030 client|<7> READ: Got 108 bytes from 0x4
3030 client|<7> READ: read 108 bytes from 0x4
3030 client|<7> RB: Have 0 bytes into buffer. Adding 108 bytes.
3030 client|<7> RB: Requested 13 bytes
3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 95
3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 95
3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.9] Handshake(22) with length: 95
3030 client|<6> BUF[REC]: Inserted 95 bytes of Data(22)
3030 client|<3> HSK[0x80024de0]: SERVER HELLO was received. Length 83[83], frag offset 0, frag length: 83, sequence: 0
3030 client| Discarded replayed handshake packet with sequence 0
3030 server|<7> WRITE: wrote 211 bytes, 0 bytes left.
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 client|<2> ASSERT: gnutls_kx.c:475
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 client|<7> READ: Got 25 bytes from 0x4
3030 client|<7> READ: read 25 bytes from 0x4
3030 client|<7> RB: Have 0 bytes into buffer. Adding 25 bytes.
3030 client|<7> RB: Requested 13 bytes
3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 12
3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 12
3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.11] Handshake(22) with length: 12
3030 client|<6> BUF[REC]: Inserted 12 bytes of Data(22)
3030 client|<3> HSK[0x80024de0]: SERVER HELLO DONE was received. Length 0[0], frag offset 0, frag length: 1, sequence: 2
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 client|<2> ASSERT: gnutls_kx.c:475
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 client|<7> READ: Got 78 bytes from 0x4
3030 client|<7> READ: read 78 bytes from 0x4
3030 client|<7> RB: Have 0 bytes into buffer. Adding 78 bytes.
3030 client|<7> RB: Requested 13 bytes
3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 65
3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 65
3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.10] Handshake(22) with length: 65
3030 client|<6> BUF[REC]: Inserted 65 bytes of Data(22)
3030 client|<3> HSK[0x80024de0]: SERVER KEY EXCHANGE was received. Length 53[53], frag offset 0, frag length: 53, sequence: 1
3030 client|<3> HSK[0x80024de0]: Selected ECC curve SECP192R1 (5)
3030 client|<2> ASSERT: gnutls_buffers.c:1150
3030 client|<3> HSK[0x80024de0]: CLIENT KEY EXCHANGE was queued [62 bytes]
3030 client|<7> HWRITE: enqueued [CLIENT KEY EXCHANGE] 62. Total 62 bytes.
3030 client|<7> HWRITE: enqueued [CHANGE CIPHER SPEC] 1. Total 63 bytes.
3030 client|<3> REC[0x80024de0]: Sent ChangeCipherSpec
3030 client|<9> INT: PREMASTER SECRET[24]: 46924e89a251944ffa68f7f301fc769c4ecd5c36c588f5ca
3030 client|<9> INT: CLIENT RANDOM[32]: 4fdda83afc0fe00adedd5fcd60b9f4f92d7469c5db56441e0aadcc0236877ab8
3030 client|<9> INT: SERVER RANDOM[32]: 4fdda83a5a07acca23a6223b671d7d5f9f9efb4072ee42c0b736794c470c247e
3030 client|<9> INT: MASTER SECRET: fbfc4b16ccec1aaf7696fba97aaaef1082b3594fcf1ec6560b7e207a857661a0753fbaf7d385dc376685704e0d8c9d75
3030 client|<4> REC[0x80024de0]: Initializing epoch #1
3030 client|<9> INT: KEY BLOCK[104]: b81f84d53053f2f3dc3c53bdcb220c179daf04052ea1e310fe2b1f5095461247
3030 client|<9> INT: CLIENT WRITE KEY [16]: d8764c81dc569d4893c535910aad3991
3030 client|<9> INT: SERVER WRITE KEY [16]: c55e4c593100030051baa4bba6eb1dba
3030 client|<4> REC[0x80024de0]: Epoch #1 ready
3030 client|<3> HSK[0x80024de0]: Cipher Suite: ECDH_ANON_AES_128_CBC_SHA1
3030 client|<3> HSK[0x80024de0]: Initializing internal [write] cipher sessions
3030 client|<3> HSK[0x80024de0]: recording tls-unique CB (send)
3030 client|<3> HSK[0x80024de0]: FINISHED was queued [24 bytes]
3030 client|<7> HWRITE: enqueued [FINISHED] 24. Total 87 bytes.
3030 client|<7> HWRITE FLUSH: 87 bytes in buffer.
3030 client|<6> DTLS[0x80024de0]: Start of flight transmission.
3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CLIENT KEY EXCHANGE(16) with length: 50, offset: 0, fragment length: 50
3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 62
3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 client|<7> WRITE: enqueued 75 bytes for 0x4. Total 75 bytes.
3030 client|<4> REC[0x80024de0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 75
3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CHANGE CIPHER SPEC(254)
3030 client|<4> REC[0x80024de0]: Preparing Packet ChangeCipherSpec(20) with length: 1
3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 client|<7> WRITE: enqueued 14 bytes for 0x4. Total 89 bytes.
3030 client|<4> REC[0x80024de0]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 14
3030 client|<6> DTLS[0x80024de0]: Sending Packet[2] fragment FINISHED(20) with length: 12, offset: 0, fragment length: 12
3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 24
3030 client|<9> ENC[0x80024de0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
3030 client|<7> WRITE: enqueued 77 bytes for 0x4. Total 166 bytes.
3030 client|<4> REC[0x80024de0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 77
3030 client|<7> WRITE FLUSH: 166 bytes in buffer.
3030 client| dropping ClientKeyExchange
3030 client| dropping ClientFinished
3030 client|<7> WRITE: wrote 166 bytes, 0 bytes left.
3030 client|<2> ASSERT: session_ticket.c:684
3030 server|<7> READ: Got 14 bytes from 0x5
3030 server|<7> READ: read 14 bytes from 0x5
3030 server|<7> RB: Have 0 bytes into buffer. Adding 14 bytes.
3030 server|<7> RB: Requested 13 bytes
3030 server|<4> REC[0x80024de0]: SSL 254.255 ChangeCipherSpec packet received. Epoch 0, length: 1
3030 server|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 server|<4> REC[0x80024de0]: Received Packet ChangeCipherSpec(20) with length: 1
3030 server|<4> REC[0x80024de0]: Decrypted Packet[0.2] ChangeCipherSpec(20) with length: 1
3030 server|<6> BUF[REC]: Inserted 1 bytes of Data(20)
3030 server|<2> ASSERT: gnutls_buffers.c:1078
3030 server|<2> ASSERT: gnutls_dtls.c:192
3030 server|<7> WRITE FLUSH: 0 bytes in buffer.
3030 server|<2> ASSERT: gnutls_buffers.c:575
3030 client|<6> DTLS[0x80024de0]: re-Start of flight transmission.
3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CLIENT KEY EXCHANGE(16) with length: 50, offset: 0, fragment length: 50
3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 62
3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 client|<7> WRITE: enqueued 75 bytes for 0x4. Total 75 bytes.
3030 client|<4> REC[0x80024de0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 75
3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CHANGE CIPHER SPEC(254)
3030 client|<4> REC[0x80024de0]: Preparing Packet ChangeCipherSpec(20) with length: 1
3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 client|<7> WRITE: enqueued 14 bytes for 0x4. Total 89 bytes.
3030 client|<4> REC[0x80024de0]: Sent Packet[5] ChangeCipherSpec(20) in epoch 0 and length: 14
3030 client|<6> DTLS[0x80024de0]: Sending Packet[2] fragment FINISHED(20) with length: 12, offset: 0, fragment length: 12
3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 24
3030 client|<9> ENC[0x80024de0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
3030 client|<7> WRITE: enqueued 77 bytes for 0x4. Total 166 bytes.
3030 client|<4> REC[0x80024de0]: Sent Packet[2] Handshake(22) in epoch 1 and length: 77
3030 client|<7> WRITE FLUSH: 166 bytes in buffer.
3030 client| dropping ClientKeyExchange
3030 client| dropping ClientFinished
3030 server|<7> READ: Got 14 bytes from 0x5
3030 server|<7> READ: read 14 bytes from 0x5
3030 server|<7> RB: Have 0 bytes into buffer. Adding 14 bytes.
3030 server|<7> RB: Requested 13 bytes
3030 server|<4> REC[0x80024de0]: SSL 254.255 ChangeCipherSpec packet received. Epoch 0, length: 1
3030 server|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 server|<4> REC[0x80024de0]: Received Packet ChangeCipherSpec(20) with length: 1
3030 server|<4> REC[0x80024de0]: Decrypted Packet[0.4] ChangeCipherSpec(20) with length: 1
3030 server|<6> BUF[REC]: Inserted 1 bytes of Data(20)
3030 server|<2> ASSERT: gnutls_buffers.c:1078
3030 server|<2> ASSERT: gnutls_buffers.c:1078
3030 server|<2> ASSERT: gnutls_dtls.c:192
3030 server|<7> WRITE FLUSH: 0 bytes in buffer.
3030 server|<2> ASSERT: gnutls_buffers.c:575
3030 client|<7> WRITE: wrote 166 bytes, 0 bytes left.
3030 client|<2> ASSERT: gnutls_dtls.c:436
3030 client|<2> ASSERT: gnutls_handshake.c:2689
3030 client|<6> DTLS[0x80024de0]: re-Start of flight transmission.
3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CLIENT KEY EXCHANGE(16) with length: 50, offset: 0, fragment length: 50
3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 62
3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 client|<7> WRITE: enqueued 75 bytes for 0x4. Total 75 bytes.
3030 client|<4> REC[0x80024de0]: Sent Packet[6] Handshake(22) in epoch 0 and length: 75
3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CHANGE CIPHER SPEC(254)
3030 client|<4> REC[0x80024de0]: Preparing Packet ChangeCipherSpec(20) with length: 1
3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 client|<7> WRITE: enqueued 14 bytes for 0x4. Total 89 bytes.
3030 client|<4> REC[0x80024de0]: Sent Packet[7] ChangeCipherSpec(20) in epoch 0 and length: 14
3030 client|<6> DTLS[0x80024de0]: Sending Packet[2] fragment FINISHED(20) with length: 12, offset: 0, fragment length: 12
3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 24
3030 client|<9> ENC[0x80024de0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
3030 client|<7> WRITE: enqueued 77 bytes for 0x4. Total 166 bytes.
3030 client|<4> REC[0x80024de0]: Sent Packet[3] Handshake(22) in epoch 1 and length: 77
3030 client|<7> WRITE FLUSH: 166 bytes in buffer.
3030 client| dropping ClientKeyExchange
3030 server|<7> READ: Got 14 bytes from 0x5
3030 server|<7> READ: read 14 bytes from 0x5
3030 server|<7> RB: Have 0 bytes into buffer. Adding 14 bytes.
3030 server|<7> RB: Requested 13 bytes
3030 server|<4> REC[0x80024de0]: SSL 254.255 ChangeCipherSpec packet received. Epoch 0, length: 1
3030 server|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 server|<4> REC[0x80024de0]: Received Packet ChangeCipherSpec(20) with length: 1
3030 server|<4> REC[0x80024de0]: Decrypted Packet[0.6] ChangeCipherSpec(20) with length: 1
3030 server|<6> BUF[REC]: Inserted 1 bytes of Data(20)
3030 server|<2> ASSERT: gnutls_buffers.c:1078
3030 server|<2> ASSERT: gnutls_buffers.c:1078
3030 server|<2> ASSERT: gnutls_buffers.c:1078
3030 server|<2> ASSERT: gnutls_dtls.c:192
3030 server|<7> WRITE FLUSH: 0 bytes in buffer.
3030 server|<2> ASSERT: gnutls_buffers.c:575
3030 client| dropping ClientFinished
3030 client|<7> WRITE: wrote 166 bytes, 0 bytes left.
3030 client|<2> ASSERT: gnutls_dtls.c:436
3030 client|<2> ASSERT: gnutls_handshake.c:2689
3030 client|<6> DTLS[0x80024de0]: re-Start of flight transmission.
3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CLIENT KEY EXCHANGE(16) with length: 50, offset: 0, fragment length: 50
3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 62
3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 client|<7> WRITE: enqueued 75 bytes for 0x4. Total 75 bytes.
3030 client|<4> REC[0x80024de0]: Sent Packet[8] Handshake(22) in epoch 0 and length: 75
3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CHANGE CIPHER SPEC(254)
3030 client|<4> REC[0x80024de0]: Preparing Packet ChangeCipherSpec(20) with length: 1
3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 client|<7> WRITE: enqueued 14 bytes for 0x4. Total 89 bytes.
3030 client|<4> REC[0x80024de0]: Sent Packet[9] ChangeCipherSpec(20) in epoch 0 and length: 14
3030 client|<6> DTLS[0x80024de0]: Sending Packet[2] fragment FINISHED(20) with length: 12, offset: 0, fragment length: 12
3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 24
3030 client|<9> ENC[0x80024de0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
3030 client|<7> WRITE: enqueued 77 bytes for 0x4. Total 166 bytes.
3030 client|<4> REC[0x80024de0]: Sent Packet[4] Handshake(22) in epoch 1 and length: 77
3030 client|<7> WRITE FLUSH: 166 bytes in buffer.
3030 server|<7> READ: Got 75 bytes from 0x5
3030 server|<7> READ: read 75 bytes from 0x5
3030 server|<7> RB: Have 0 bytes into buffer. Adding 75 bytes.
3030 server|<7> RB: Requested 13 bytes
3030 server|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 62
3030 server|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 server|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 62
3030 server|<4> REC[0x80024de0]: Decrypted Packet[0.7] Handshake(22) with length: 62
3030 server|<6> BUF[REC]: Inserted 62 bytes of Data(22)
3030 server|<2> ASSERT: gnutls_buffers.c:1078
3030 server|<2> ASSERT: gnutls_buffers.c:1078
3030 server|<2> ASSERT: gnutls_buffers.c:1078
3030 server|<3> HSK[0x80024de0]: CLIENT KEY EXCHANGE was received. Length 50[50], frag offset 0, frag length: 50, sequence: 1
3030 server|<6> DTLS[0x80024de0]: End of flight transmission.
3030 server|<2> ASSERT: gnutls_buffers.c:1150
3030 server|<9> INT: PREMASTER SECRET[24]: 46924e89a251944ffa68f7f301fc769c4ecd5c36c588f5ca
3030 client|<7> WRITE: wrote 166 bytes, 0 bytes left.
3030 server|<9> INT: CLIENT RANDOM[32]: 4fdda83afc0fe00adedd5fcd60b9f4f92d7469c5db56441e0aadcc0236877ab8
3030 server|<9> INT: SERVER RANDOM[32]: 4fdda83a5a07acca23a6223b671d7d5f9f9efb4072ee42c0b736794c470c247e
3030 server|<9> INT: MASTER SECRET: fbfc4b16ccec1aaf7696fba97aaaef1082b3594fcf1ec6560b7e207a857661a0753fbaf7d385dc376685704e0d8c9d75
3030 server|<4> REC[0x80024de0]: Initializing epoch #1
3030 server|<9> INT: KEY BLOCK[104]: b81f84d53053f2f3dc3c53bdcb220c179daf04052ea1e310fe2b1f5095461247
3030 server|<9> INT: CLIENT WRITE KEY [16]: d8764c81dc569d4893c535910aad3991
3030 server|<9> INT: SERVER WRITE KEY [16]: c55e4c593100030051baa4bba6eb1dba
3030 server|<4> REC[0x80024de0]: Epoch #1 ready
3030 server|<3> HSK[0x80024de0]: Cipher Suite: ECDH_ANON_AES_128_CBC_SHA1
3030 client|<2> ASSERT: gnutls_dtls.c:436
3030 client|<2> ASSERT: gnutls_handshake.c:2689
3030 server|<2> ASSERT: gnutls_buffers.c:978
3030 server|<2> ASSERT: gnutls_buffers.c:1078
3030 server|<2> ASSERT: gnutls_buffers.c:1078
3030 server|<2> ASSERT: gnutls_buffers.c:978
3030 server|<7> READ: Got 14 bytes from 0x5
3030 server|<7> READ: read 14 bytes from 0x5
3030 server|<7> RB: Have 0 bytes into buffer. Adding 14 bytes.
3030 server|<7> RB: Requested 13 bytes
3030 server|<4> REC[0x80024de0]: SSL 254.255 ChangeCipherSpec packet received. Epoch 0, length: 1
3030 server|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 server|<4> REC[0x80024de0]: Received Packet ChangeCipherSpec(20) with length: 1
3030 server|<2> ASSERT: gnutls_cipher.c:513
3030 server|<2> ASSERT: gnutls_cipher.c:162
3030 server|<2> ASSERT: gnutls_record.c:1039
3030 server| Discarded message[8] due to invalid decryption
3030 server|<2> ASSERT: gnutls_record.c:1127
3030 server|<2> ASSERT: gnutls_handshake.c:685
3030 server|<2> ASSERT: gnutls_handshake.c:2734
3030 server|<2> ASSERT: gnutls_buffers.c:978
3030 server|<2> ASSERT: gnutls_buffers.c:1078
3030 server|<2> ASSERT: gnutls_buffers.c:1078
3030 server|<2> ASSERT: gnutls_buffers.c:978
3030 server|<7> READ: Got 77 bytes from 0x5
3030 server|<7> READ: read 77 bytes from 0x5
3030 server|<7> RB: Have 0 bytes into buffer. Adding 77 bytes.
3030 server|<7> RB: Requested 13 bytes
3030 server|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 1, length: 64
3030 server|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 server|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 64
3030 server|<4> REC[0x80024de0]: Decrypted Packet[1.3] Handshake(22) with length: 24
3030 server|<6> BUF[REC]: Inserted 24 bytes of Data(22)
3030 server|<2> ASSERT: gnutls_buffers.c:1078
3030 server|<2> ASSERT: gnutls_buffers.c:1078
3030 server|<3> HSK[0x80024de0]: FINISHED was received. Length 12[12], frag offset 0, frag length: 12, sequence: 2
3030 server|<3> HSK[0x80024de0]: recording tls-unique CB (recv)
3030 server|<7> HWRITE: enqueued [CHANGE CIPHER SPEC] 1. Total 1 bytes.
3030 server|<3> REC[0x80024de0]: Sent ChangeCipherSpec
3030 server|<3> HSK[0x80024de0]: Cipher Suite: ECDH_ANON_AES_128_CBC_SHA1
3030 server|<3> HSK[0x80024de0]: Initializing internal [write] cipher sessions
3030 server|<3> HSK[0x80024de0]: FINISHED was queued [24 bytes]
3030 server|<7> HWRITE: enqueued [FINISHED] 24. Total 25 bytes.
3030 server|<7> HWRITE FLUSH: 25 bytes in buffer.
3030 server|<6> DTLS[0x80024de0]: Start of flight transmission.
3030 server|<6> DTLS[0x80024de0]: Sending Packet[2] fragment CHANGE CIPHER SPEC(254)
3030 server|<4> REC[0x80024de0]: Preparing Packet ChangeCipherSpec(20) with length: 1
3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
3030 server|<7> WRITE: enqueued 14 bytes for 0x5. Total 14 bytes.
3030 server|<4> REC[0x80024de0]: Sent Packet[13] ChangeCipherSpec(20) in epoch 0 and length: 14
3030 server|<6> DTLS[0x80024de0]: Sending Packet[3] fragment FINISHED(20) with length: 12, offset: 0, fragment length: 12
3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 24
3030 server|<9> ENC[0x80024de0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
3030 server|<7> WRITE: enqueued 77 bytes for 0x5. Total 91 bytes.
3030 server|<4> REC[0x80024de0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 77
3030 server|<7> WRITE FLUSH: 91 bytes in buffer.
3030 server|<7> WRITE: wrote 91 bytes, 0 bytes left.
3030 server|<6> DTLS[0x80024de0]: Initializing timer for handshake state.
3030 server|<4> REC[0x80024de0]: Start of epoch cleanup
3030 server|<4> REC[0x80024de0]: Note inactive epoch 0 has 1 users
3030 server|<4> REC[0x80024de0]: End of epoch cleanup
3030 server| Discarded unexpected ChangeCipherSpec (20) packet (expecting: Application Data (23))
3030 server|<2> ASSERT: gnutls_buffers.c:124
3030 server|<2> ASSERT: gnutls_record.c:515
3030 server| Discarded unexpected ChangeCipherSpec (20) packet (expecting: Application Data (23))
3030 server|<2> ASSERT: gnutls_buffers.c:124
3030 server|<2> ASSERT: gnutls_record.c:515
3030 client|<7> READ: Got 14 bytes from 0x4
3030 client|<7> READ: read 14 bytes from 0x4
3030 client|<7> RB: Have 0 bytes into buffer. Adding 14 bytes.
3030 client|<7> RB: Requested 13 bytes
3030 client|<4> REC[0x80024de0]: SSL 254.255 ChangeCipherSpec packet received. Epoch 0, length: 1
3030 client|<4> REC[0x80024de0]: Expected Packet ChangeCipherSpec(20)
3030 client|<4> REC[0x80024de0]: Received Packet ChangeCipherSpec(20) with length: 1
3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.12] ChangeCipherSpec(20) with length: 1
3030 client|<6> BUF[REC]: Inserted 1 bytes of Data(20)
3030 client|<3> HSK[0x80024de0]: Cipher Suite: ECDH_ANON_AES_128_CBC_SHA1
3030 client|<2> ASSERT: gnutls_buffers.c:978
3030 client|<7> READ: Got 77 bytes from 0x4
3030 client|<7> READ: read 77 bytes from 0x4
3030 client|<7> RB: Have 0 bytes into buffer. Adding 77 bytes.
3030 client|<7> RB: Requested 13 bytes
3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 1, length: 64
3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22)
3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 64
3030 client|<4> REC[0x80024de0]: Decrypted Packet[1.0] Handshake(22) with length: 24
3030 client|<6> BUF[REC]: Inserted 24 bytes of Data(22)
3030 client|<3> HSK[0x80024de0]: FINISHED was received. Length 12[12], frag offset 0, frag length: 12, sequence: 3
3030 client|<4> REC[0x80024de0]: Start of epoch cleanup
3030 client|<4> REC[0x80024de0]: Epoch #0 freed
3030 client|<4> REC[0x80024de0]: End of epoch cleanup
3030 client|<4> REC[0x80024de0]: Start of epoch cleanup
3030 client|<4> REC[0x80024de0]: End of epoch cleanup
3030 client|<4> REC[0x80024de0]: Preparing Packet Application Data(23) with length: 7
3030 client|<9> ENC[0x80024de0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
3030 client|<7> WRITE: enqueued 61 bytes for 0x4. Total 61 bytes.
3030 client|<7> WRITE FLUSH: 61 bytes in buffer.
3030 client|<7> WRITE: wrote 61 bytes, 0 bytes left.
3030 client|<4> REC[0x80024de0]: Sent Packet[5] Application Data(23) in epoch 1 and length: 61
3030 server|<7> READ: Got 61 bytes from 0x5
3030 server|<7> READ: read 61 bytes from 0x5
3030 server|<7> RB: Have 0 bytes into buffer. Adding 61 bytes.
3030 server|<7> RB: Requested 13 bytes
3030 server|<4> REC[0x80024de0]: SSL 254.255 Application Data packet received. Epoch 1, length: 48
3030 server|<4> REC[0x80024de0]: Expected Packet Application Data(23)
3030 server|<4> REC[0x80024de0]: Received Packet Application Data(23) with length: 48
3030 server|<4> REC[0x80024de0]: Decrypted Packet[1.4] Application Data(23) with length: 7
3030 server|<6> BUF[REC]: Inserted 7 bytes of Data(23)
3030 server|<6> DTLS[0x80024de0]: Deinitializing previous handshake state.
3030 server|<4> REC[0x80024de0]: Start of epoch cleanup
3030 server|<4> REC[0x80024de0]: Epoch #0 freed
3030 server|<4> REC[0x80024de0]: End of epoch cleanup
3030 server|<4> REC[0x80024de0]: Preparing Packet Application Data(23) with length: 7
3030 server|<9> ENC[0x80024de0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
3030 server|<7> WRITE: enqueued 61 bytes for 0x5. Total 61 bytes.
3030 server|<7> WRITE FLUSH: 61 bytes in buffer.
3030 server|<7> WRITE: wrote 61 bytes, 0 bytes left.
3030 server|<4> REC[0x80024de0]: Sent Packet[2] Application Data(23) in epoch 1 and length: 61
3030 client|<7> READ: Got 61 bytes from 0x4
3030 client|<7> READ: read 61 bytes from 0x4
3030 client|<7> RB: Have 0 bytes into buffer. Adding 61 bytes.
3030 client|<7> RB: Requested 13 bytes
3030 client|<4> REC[0x80024de0]: SSL 254.255 Application Data packet received. Epoch 1, length: 48
3030 client|<4> REC[0x80024de0]: Expected Packet Application Data(23)
3030 client|<4> REC[0x80024de0]: Received Packet Application Data(23) with length: 48
3030 client|<4> REC[0x80024de0]: Decrypted Packet[1.1] Application Data(23) with length: 7
3030 client|<6> BUF[REC]: Inserted 7 bytes of Data(23)
3030 -- SHello(021), SFinished(01), CFinished(012) :- SKeyExchange, CKeyExchange, CFinished
1
More information about the Gnutls-devel
mailing list