[gnutls-devel] 3.3.15 testsuite error on kfreebsd-*
Andreas Metzler
ametzler at bebt.de
Tue May 5 19:39:17 CEST 2015
Hello,
the newly added sign-md5-rep test often (but not always) fails on
kfreebsd-*. --verbose does not look enlightening to me, but I have
attached logs both of a failing and a working run nevertheless.
cu Andreas
--
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'
-------------- next part --------------
client|<5>| REC[0x6227b0]: Allocating epoch #0
client|<3>| ASSERT: gnutls_constate.c:586
client|<5>| REC[0x6227b0]: Allocating epoch #1
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.8A)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.8B)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA384 (C0.28)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_CBC_SHA256 (C0.76)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_CBC_SHA384 (C0.77)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_ARCFOUR_128_SHA1 (C0.11)
client|<4>| EXT[0x6227b0]: Sending extension STATUS REQUEST (5 bytes)
client|<4>| EXT[0x6227b0]: Sending extension SAFE RENEGOTIATION (1 bytes)
client|<4>| EXT[0x6227b0]: Sending extension SESSION TICKET (0 bytes)
client|<4>| EXT[0x6227b0]: Sending extension SUPPORTED ECC (12 bytes)
client|<4>| EXT[0x6227b0]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
client|<4>| EXT[0x6227b0]: sent signature algo (1.1) RSA-MD5
client|<4>| EXT[0x6227b0]: Sending extension SIGNATURE ALGORITHMS (4 bytes)
client|<4>| HSK[0x6227b0]: CLIENT HELLO was queued [117 bytes]
client|<5>| REC[0x6227b0]: Preparing Packet Handshake(22) with length: 117 and min pad: 0
client|<5>| REC[0x6227b0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 122
client|<3>| ASSERT: gnutls_buffers.c:1138
server|<3>| ASSERT: common.c:1052
server|<3>| ASSERT: common.c:1052
server|<3>| ASSERT: x509_ext.c:115
server|<3>| ASSERT: x509.c:1396
server|<3>| ASSERT: common.c:1052
server|<3>| ASSERT: common.c:1052
server|<5>| REC[0x624170]: Allocating epoch #0
server|<3>| ASSERT: gnutls_constate.c:586
server|<5>| REC[0x624170]: Allocating epoch #1
server|<3>| ASSERT: gnutls_buffers.c:1138
server|<10>| READ: Got 5 bytes from 0x5
server|<10>| READ: read 5 bytes from 0x5
server|<10>| RB: Have 0 bytes into buffer. Adding 5 bytes.
server|<10>| RB: Requested 5 bytes
server|<5>| REC[0x624170]: SSL 3.1 Handshake packet received. Epoch 0, length: 117
server|<5>| REC[0x624170]: Expected Packet Handshake(22)
server|<5>| REC[0x624170]: Received Packet Handshake(22) with length: 117
server|<10>| READ: Got 117 bytes from 0x5
server|<10>| READ: read 117 bytes from 0x5
server|<10>| RB: Have 5 bytes into buffer. Adding 117 bytes.
server|<10>| RB: Requested 122 bytes
server|<5>| REC[0x624170]: Decrypted Packet[0] Handshake(22) with length: 117
server|<13>| BUF[REC]: Inserted 117 bytes of Data(22)
server|<4>| HSK[0x624170]: CLIENT HELLO (1) was received. Length 113[113], frag offset 0, frag length: 113, sequence: 0
server|<4>| HSK[0x624170]: Client's version: 3.3
server|<3>| ASSERT: gnutls_db.c:263
server|<4>| EXT[0x624170]: Found extension 'STATUS REQUEST/5'
server|<4>| EXT[0x624170]: Found extension 'SAFE RENEGOTIATION/65281'
server|<4>| EXT[0x624170]: Found extension 'SESSION TICKET/35'
server|<4>| EXT[0x624170]: Found extension 'SUPPORTED ECC/10'
server|<4>| EXT[0x624170]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
server|<4>| EXT[0x624170]: Found extension 'SIGNATURE ALGORITHMS/13'
server|<4>| EXT[0x624170]: Found extension 'STATUS REQUEST/5'
server|<4>| EXT[0x624170]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
server|<4>| EXT[0x624170]: Parsing extension 'SESSION TICKET/35' (0 bytes)
server|<4>| EXT[0x624170]: Found extension 'SUPPORTED ECC/10'
server|<4>| EXT[0x624170]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
server|<4>| EXT[0x624170]: Found extension 'SIGNATURE ALGORITHMS/13'
server|<4>| EXT[0x624170]: Parsing extension 'STATUS REQUEST/5' (5 bytes)
server|<4>| EXT[0x624170]: Found extension 'SAFE RENEGOTIATION/65281'
server|<4>| EXT[0x624170]: Found extension 'SESSION TICKET/35'
server|<4>| EXT[0x624170]: Parsing extension 'SUPPORTED ECC/10' (12 bytes)
server|<4>| HSK[0x624170]: Selected ECC curve SECP256R1 (2)
server|<4>| EXT[0x624170]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes)
server|<4>| EXT[0x624170]: Parsing extension 'SIGNATURE ALGORITHMS/13' (4 bytes)
server|<4>| EXT[0x624170]: rcvd signature algo (1.1) RSA-MD5
server|<3>| ASSERT: server_name.c:297
server|<4>| HSK[0x624170]: Requested PK algorithm: RSA (1) -- ctype: X.509 (1)
server|<4>| HSK[0x624170]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.8A)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.8B)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA384 (C0.28)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_CBC_SHA256 (C0.76)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_CBC_SHA384 (C0.77)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_ARCFOUR_128_SHA1 (C0.11)
server|<4>| HSK[0x624170]: Requested cipher suites[size: 24]:
server|<4>| 0xc0, 0x2f ECDHE_RSA_AES_128_GCM_SHA256
server|<4>| HSK[0x624170]: Selected cipher suite: ECDHE_RSA_AES_128_GCM_SHA256
server|<4>| HSK[0x624170]: Selected Compression Method: NULL
server|<4>| HSK[0x624170]: Safe renegotiation succeeded
server|<3>| ASSERT: status_request.c:218
server|<4>| EXT[0x624170]: Sending extension SAFE RENEGOTIATION (1 bytes)
server|<4>| EXT[0x624170]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
server|<4>| HSK[0x624170]: SessionID: f7dd72bc01ec0252594a112bb135f2e30741b0da5f03efc7b9f4a72fa401702f
server|<4>| HSK[0x624170]: SERVER HELLO was queued [87 bytes]
server|<11>| HWRITE: enqueued [SERVER HELLO] 87. Total 87 bytes.
server|<4>| HSK[0x624170]: CERTIFICATE was queued [612 bytes]
server|<11>| HWRITE: enqueued [CERTIFICATE] 612. Total 699 bytes.
server|<4>| HSK[0x624170]: signing handshake data: using RSA-MD5
server|<4>| HSK[0x624170]: SERVER KEY EXCHANGE was queued [205 bytes]
server|<11>| HWRITE: enqueued [SERVER KEY EXCHANGE] 205. Total 904 bytes.
server|<4>| HSK[0x624170]: SERVER HELLO DONE was queued [4 bytes]
server|<11>| HWRITE: enqueued [SERVER HELLO DONE] 4. Total 908 bytes.
server|<11>| HWRITE FLUSH: 908 bytes in buffer.
server|<5>| REC[0x624170]: Preparing Packet Handshake(22) with length: 87 and min pad: 0
server|<9>| ENC[0x624170]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
server|<11>| WRITE: enqueued 92 bytes for 0x5. Total 92 bytes.
server|<5>| REC[0x624170]: Sent Packet[1] Handshake(22) in epoch 0 and length: 92
server|<11>| HWRITE: wrote 1 bytes, 821 bytes left.
server|<5>| REC[0x624170]: Preparing Packet Handshake(22) with length: 612 and min pad: 0
server|<9>| ENC[0x624170]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
server|<11>| WRITE: enqueued 617 bytes for 0x5. Total 709 bytes.
server|<5>| REC[0x624170]: Sent Packet[2] Handshake(22) in epoch 0 and length: 617
server|<11>| HWRITE: wrote 1 bytes, 209 bytes left.
server|<5>| REC[0x624170]: Preparing Packet Handshake(22) with length: 205 and min pad: 0
server|<9>| ENC[0x624170]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
server|<11>| WRITE: enqueued 210 bytes for 0x5. Total 919 bytes.
server|<5>| REC[0x624170]: Sent Packet[3] Handshake(22) in epoch 0 and length: 210
server|<11>| HWRITE: wrote 1 bytes, 4 bytes left.
server|<5>| REC[0x624170]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
server|<9>| ENC[0x624170]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
server|<11>| WRITE: enqueued 9 bytes for 0x5. Total 928 bytes.
server|<5>| REC[0x624170]: Sent Packet[4] Handshake(22) in epoch 0 and length: 9
server|<11>| HWRITE: wrote 1 bytes, 0 bytes left.
server|<11>| WRITE FLUSH: 928 bytes in buffer.
server|<11>| WRITE: wrote 928 bytes, 0 bytes left.
server|<3>| ASSERT: gnutls_buffers.c:1138
client|<5>| REC[0x6227b0]: SSL 3.3 Handshake packet received. Epoch 0, length: 87
client|<5>| REC[0x6227b0]: Expected Packet Handshake(22)
client|<5>| REC[0x6227b0]: Received Packet Handshake(22) with length: 87
client|<5>| REC[0x6227b0]: Decrypted Packet[0] Handshake(22) with length: 87
client|<4>| HSK[0x6227b0]: SERVER HELLO (2) was received. Length 83[83], frag offset 0, frag length: 83, sequence: 0
client|<4>| HSK[0x6227b0]: Server's version: 3.3
client|<4>| HSK[0x6227b0]: SessionID length: 32
client|<4>| HSK[0x6227b0]: SessionID: f7dd72bc01ec0252594a112bb135f2e30741b0da5f03efc7b9f4a72fa401702f
client|<4>| HSK[0x6227b0]: Selected cipher suite: ECDHE_RSA_AES_128_GCM_SHA256
client|<4>| HSK[0x6227b0]: Selected compression method: NULL (0)
client|<4>| EXT[0x6227b0]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
client|<4>| EXT[0x6227b0]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes)
client|<4>| HSK[0x6227b0]: Safe renegotiation succeeded
client|<3>| ASSERT: gnutls_buffers.c:1138
client|<5>| REC[0x6227b0]: SSL 3.3 Handshake packet received. Epoch 0, length: 612
client|<5>| REC[0x6227b0]: Expected Packet Handshake(22)
client|<5>| REC[0x6227b0]: Received Packet Handshake(22) with length: 612
client|<5>| REC[0x6227b0]: Decrypted Packet[1] Handshake(22) with length: 612
client|<4>| HSK[0x6227b0]: CERTIFICATE (11) was received. Length 608[608], frag offset 0, frag length: 608, sequence: 0
client|<3>| ASSERT: common.c:1052
client|<3>| ASSERT: common.c:1052
client|<3>| ASSERT: gnutls_buffers.c:1138
client|<5>| REC[0x6227b0]: SSL 3.3 Handshake packet received. Epoch 0, length: 205
client|<5>| REC[0x6227b0]: Expected Packet Handshake(22)
client|<5>| REC[0x6227b0]: Received Packet Handshake(22) with length: 205
client|<5>| REC[0x6227b0]: Decrypted Packet[2] Handshake(22) with length: 205
client|<4>| HSK[0x6227b0]: SERVER KEY EXCHANGE (12) was received. Length 201[201], frag offset 0, frag length: 201, sequence: 0
client|<4>| HSK[0x6227b0]: Selected ECC curve SECP256R1 (2)
client|<3>| ASSERT: common.c:1052
client|<3>| ASSERT: common.c:1052
client|<4>| HSK[0x6227b0]: verify handshake data: using RSA-MD5
client|<3>| ASSERT: gnutls_sig.c:352
client|<3>| ASSERT: cert.c:2264
client|<3>| ASSERT: gnutls_kx.c:459
client|<3>| ASSERT: gnutls_handshake.c:2760
server|<10>| READ: Got 0 bytes from 0x5
server|<10>| READ: read 0 bytes from 0x5
server|<3>| ASSERT: gnutls_buffers.c:576
server|<3>| ASSERT: gnutls_record.c:1058
server|<3>| ASSERT: gnutls_record.c:1179
server|<3>| ASSERT: gnutls_buffers.c:1392
server|<3>| ASSERT: gnutls_handshake.c:1428
server|<3>| ASSERT: gnutls_handshake.c:3193
server|<5>| REC[0x624170]: Start of epoch cleanup
server|<5>| REC[0x624170]: End of epoch cleanup
server|<5>| REC[0x624170]: Epoch #0 freed
server|<5>| REC[0x624170]: Epoch #1 freed
server: Handshake has failed (The TLS connection was non-properly terminated.)
Child died with status 1
-------------- next part --------------
client|<5>| REC[0x6227b0]: Allocating epoch #0
client|<3>| ASSERT: gnutls_constate.c:586
client|<5>| REC[0x6227b0]: Allocating epoch #1
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.8A)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.8B)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA384 (C0.28)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_CBC_SHA256 (C0.76)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_CBC_SHA384 (C0.77)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)
client|<4>| HSK[0x6227b0]: Keeping ciphersuite: ECDHE_RSA_ARCFOUR_128_SHA1 (C0.11)
client|<4>| EXT[0x6227b0]: Sending extension STATUS REQUEST (5 bytes)
client|<4>| EXT[0x6227b0]: Sending extension SAFE RENEGOTIATION (1 bytes)
client|<4>| EXT[0x6227b0]: Sending extension SESSION TICKET (0 bytes)
client|<4>| EXT[0x6227b0]: Sending extension SUPPORTED ECC (12 bytes)
client|<4>| EXT[0x6227b0]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
client|<4>| EXT[0x6227b0]: sent signature algo (1.1) RSA-MD5
client|<4>| EXT[0x6227b0]: Sending extension SIGNATURE ALGORITHMS (4 bytes)
client|<4>| HSK[0x6227b0]: CLIENT HELLO was queued [117 bytes]
client|<5>| REC[0x6227b0]: Preparing Packet Handshake(22) with length: 117 and min pad: 0
client|<5>| REC[0x6227b0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 122
client|<3>| ASSERT: gnutls_buffers.c:1138
server|<3>| ASSERT: common.c:1052
server|<3>| ASSERT: common.c:1052
server|<3>| ASSERT: x509_ext.c:115
server|<3>| ASSERT: x509.c:1396
server|<3>| ASSERT: common.c:1052
server|<3>| ASSERT: common.c:1052
server|<5>| REC[0x624170]: Allocating epoch #0
server|<3>| ASSERT: gnutls_constate.c:586
server|<5>| REC[0x624170]: Allocating epoch #1
server|<3>| ASSERT: gnutls_buffers.c:1138
server|<10>| READ: Got 5 bytes from 0x5
server|<10>| READ: read 5 bytes from 0x5
server|<10>| RB: Have 0 bytes into buffer. Adding 5 bytes.
server|<10>| RB: Requested 5 bytes
server|<5>| REC[0x624170]: SSL 3.1 Handshake packet received. Epoch 0, length: 117
server|<5>| REC[0x624170]: Expected Packet Handshake(22)
server|<5>| REC[0x624170]: Received Packet Handshake(22) with length: 117
server|<10>| READ: Got 117 bytes from 0x5
server|<10>| READ: read 117 bytes from 0x5
server|<10>| RB: Have 5 bytes into buffer. Adding 117 bytes.
server|<10>| RB: Requested 122 bytes
server|<5>| REC[0x624170]: Decrypted Packet[0] Handshake(22) with length: 117
server|<13>| BUF[REC]: Inserted 117 bytes of Data(22)
server|<4>| HSK[0x624170]: CLIENT HELLO (1) was received. Length 113[113], frag offset 0, frag length: 113, sequence: 0
server|<4>| HSK[0x624170]: Client's version: 3.3
server|<3>| ASSERT: gnutls_db.c:263
server|<4>| EXT[0x624170]: Found extension 'STATUS REQUEST/5'
server|<4>| EXT[0x624170]: Found extension 'SAFE RENEGOTIATION/65281'
server|<4>| EXT[0x624170]: Found extension 'SESSION TICKET/35'
server|<4>| EXT[0x624170]: Found extension 'SUPPORTED ECC/10'
server|<4>| EXT[0x624170]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
server|<4>| EXT[0x624170]: Found extension 'SIGNATURE ALGORITHMS/13'
server|<4>| EXT[0x624170]: Found extension 'STATUS REQUEST/5'
server|<4>| EXT[0x624170]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
server|<4>| EXT[0x624170]: Parsing extension 'SESSION TICKET/35' (0 bytes)
server|<4>| EXT[0x624170]: Found extension 'SUPPORTED ECC/10'
server|<4>| EXT[0x624170]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
server|<4>| EXT[0x624170]: Found extension 'SIGNATURE ALGORITHMS/13'
server|<4>| EXT[0x624170]: Parsing extension 'STATUS REQUEST/5' (5 bytes)
server|<4>| EXT[0x624170]: Found extension 'SAFE RENEGOTIATION/65281'
server|<4>| EXT[0x624170]: Found extension 'SESSION TICKET/35'
server|<4>| EXT[0x624170]: Parsing extension 'SUPPORTED ECC/10' (12 bytes)
server|<4>| HSK[0x624170]: Selected ECC curve SECP256R1 (2)
server|<4>| EXT[0x624170]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes)
server|<4>| EXT[0x624170]: Parsing extension 'SIGNATURE ALGORITHMS/13' (4 bytes)
server|<4>| EXT[0x624170]: rcvd signature algo (1.1) RSA-MD5
server|<3>| ASSERT: server_name.c:297
server|<4>| HSK[0x624170]: Requested PK algorithm: RSA (1) -- ctype: X.509 (1)
server|<4>| HSK[0x624170]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.8A)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.8B)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA384 (C0.28)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_CBC_SHA256 (C0.76)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_CBC_SHA384 (C0.77)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)
server|<4>| HSK[0x624170]: Keeping ciphersuite: ECDHE_RSA_ARCFOUR_128_SHA1 (C0.11)
server|<4>| HSK[0x624170]: Requested cipher suites[size: 24]:
server|<4>| 0xc0, 0x2f ECDHE_RSA_AES_128_GCM_SHA256
server|<4>| HSK[0x624170]: Selected cipher suite: ECDHE_RSA_AES_128_GCM_SHA256
server|<4>| HSK[0x624170]: Selected Compression Method: NULL
server|<4>| HSK[0x624170]: Safe renegotiation succeeded
server|<3>| ASSERT: status_request.c:218
server|<4>| EXT[0x624170]: Sending extension SAFE RENEGOTIATION (1 bytes)
server|<4>| EXT[0x624170]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
server|<4>| HSK[0x624170]: SessionID: 05d4f997cb5645f9fd6ea27fbb42b86a8409f44519d9d2d633d171d8c68e2558
server|<4>| HSK[0x624170]: SERVER HELLO was queued [87 bytes]
server|<11>| HWRITE: enqueued [SERVER HELLO] 87. Total 87 bytes.
server|<4>| HSK[0x624170]: CERTIFICATE was queued [612 bytes]
server|<11>| HWRITE: enqueued [CERTIFICATE] 612. Total 699 bytes.
server|<4>| HSK[0x624170]: signing handshake data: using RSA-MD5
server|<4>| HSK[0x624170]: SERVER KEY EXCHANGE was queued [205 bytes]
server|<11>| HWRITE: enqueued [SERVER KEY EXCHANGE] 205. Total 904 bytes.
server|<4>| HSK[0x624170]: SERVER HELLO DONE was queued [4 bytes]
server|<11>| HWRITE: enqueued [SERVER HELLO DONE] 4. Total 908 bytes.
server|<11>| HWRITE FLUSH: 908 bytes in buffer.
server|<5>| REC[0x624170]: Preparing Packet Handshake(22) with length: 87 and min pad: 0
server|<9>| ENC[0x624170]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
server|<11>| WRITE: enqueued 92 bytes for 0x5. Total 92 bytes.
server|<5>| REC[0x624170]: Sent Packet[1] Handshake(22) in epoch 0 and length: 92
server|<11>| HWRITE: wrote 1 bytes, 821 bytes left.
server|<5>| REC[0x624170]: Preparing Packet Handshake(22) with length: 612 and min pad: 0
server|<9>| ENC[0x624170]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
server|<11>| WRITE: enqueued 617 bytes for 0x5. Total 709 bytes.
server|<5>| REC[0x624170]: Sent Packet[2] Handshake(22) in epoch 0 and length: 617
server|<11>| HWRITE: wrote 1 bytes, 209 bytes left.
server|<5>| REC[0x624170]: Preparing Packet Handshake(22) with length: 205 and min pad: 0
server|<9>| ENC[0x624170]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
server|<11>| WRITE: enqueued 210 bytes for 0x5. Total 919 bytes.
server|<5>| REC[0x624170]: Sent Packet[3] Handshake(22) in epoch 0 and length: 210
server|<11>| HWRITE: wrote 1 bytes, 4 bytes left.
server|<5>| REC[0x624170]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
server|<9>| ENC[0x624170]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
server|<11>| WRITE: enqueued 9 bytes for 0x5. Total 928 bytes.
server|<5>| REC[0x624170]: Sent Packet[4] Handshake(22) in epoch 0 and length: 9
server|<11>| HWRITE: wrote 1 bytes, 0 bytes left.
server|<11>| WRITE FLUSH: 928 bytes in buffer.
server|<11>| WRITE: wrote 928 bytes, 0 bytes left.
server|<3>| ASSERT: gnutls_buffers.c:1138
client|<5>| REC[0x6227b0]: SSL 3.3 Handshake packet received. Epoch 0, length: 87
client|<5>| REC[0x6227b0]: Expected Packet Handshake(22)
client|<5>| REC[0x6227b0]: Received Packet Handshake(22) with length: 87
client|<5>| REC[0x6227b0]: Decrypted Packet[0] Handshake(22) with length: 87
client|<4>| HSK[0x6227b0]: SERVER HELLO (2) was received. Length 83[83], frag offset 0, frag length: 83, sequence: 0
client|<4>| HSK[0x6227b0]: Server's version: 3.3
client|<4>| HSK[0x6227b0]: SessionID length: 32
client|<4>| HSK[0x6227b0]: SessionID: 05d4f997cb5645f9fd6ea27fbb42b86a8409f44519d9d2d633d171d8c68e2558
client|<4>| HSK[0x6227b0]: Selected cipher suite: ECDHE_RSA_AES_128_GCM_SHA256
client|<4>| HSK[0x6227b0]: Selected compression method: NULL (0)
client|<4>| EXT[0x6227b0]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
client|<4>| EXT[0x6227b0]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes)
client|<4>| HSK[0x6227b0]: Safe renegotiation succeeded
client|<3>| ASSERT: gnutls_buffers.c:1138
client|<5>| REC[0x6227b0]: SSL 3.3 Handshake packet received. Epoch 0, length: 612
client|<5>| REC[0x6227b0]: Expected Packet Handshake(22)
client|<5>| REC[0x6227b0]: Received Packet Handshake(22) with length: 612
client|<5>| REC[0x6227b0]: Decrypted Packet[1] Handshake(22) with length: 612
client|<4>| HSK[0x6227b0]: CERTIFICATE (11) was received. Length 608[608], frag offset 0, frag length: 608, sequence: 0
client|<3>| ASSERT: common.c:1052
client|<3>| ASSERT: common.c:1052
client|<3>| ASSERT: gnutls_buffers.c:1138
client|<5>| REC[0x6227b0]: SSL 3.3 Handshake packet received. Epoch 0, length: 205
client|<5>| REC[0x6227b0]: Expected Packet Handshake(22)
client|<5>| REC[0x6227b0]: Received Packet Handshake(22) with length: 205
client|<5>| REC[0x6227b0]: Decrypted Packet[2] Handshake(22) with length: 205
client|<4>| HSK[0x6227b0]: SERVER KEY EXCHANGE (12) was received. Length 201[201], frag offset 0, frag length: 201, sequence: 0
client|<4>| HSK[0x6227b0]: Selected ECC curve SECP256R1 (2)
client|<3>| ASSERT: common.c:1052
client|<3>| ASSERT: common.c:1052
client|<4>| HSK[0x6227b0]: verify handshake data: using RSA-MD5
client|<3>| ASSERT: gnutls_sig.c:352
client|<3>| ASSERT: cert.c:2264
client|<3>| ASSERT: gnutls_kx.c:459
client|<3>| ASSERT: gnutls_handshake.c:2760
client|<5>| REC[0x6227b0]: Start of epoch cleanup
client|<5>| REC[0x6227b0]: End of epoch cleanup
client|<5>| REC[0x6227b0]: Epoch #0 freed
client|<5>| REC[0x6227b0]: Epoch #1 freed
Self test `./sign-md5-rep' finished with 0 errors
More information about the Gnutls-devel
mailing list