[gnutls-devel] Bug#813598: FTBFS[kfreebsd]: tests/mini-loss-time race

Steven Chamberlain steven at pyro.eu.org
Sat Mar 5 19:57:03 CET 2016


Hi Andreas,

In a future upload please could you try the attached diff, which is a
much simpler way I found to get the testsuite output into the build log.
Since more than one set of tests runs in parallel, we only currently see
the test-suite.log for one set of tests, and not all of them.

> On Sat, 2016-03-05 at 17:30 +0100, Andreas Metzler wrote:
> > Well with 3.4.10 the timeout does not seem to make any difference. 
> > Any of
> > 
> > gnutls_dtls_set_timeouts(session, 1 * 1000, 29 * 1000); [Steven's 
> > patch]

Your commit to the gnutls28 package in experimental
https://anonscm.debian.org/cgit/pkg-gnutls/gnutls.git/commit/?h=experimental&id=896b247a321271ab61ed1fce5065cadbd472c207
seems to do the opposite of my patch, it increases the server timeout?
My patch decreased it:  https://bugs.debian.org/813598#5

> > gnutls_dtls_set_timeouts(session, 1 * 1000, 30 * 1000); [3.4.10]
> > gnutls_dtls_set_timeouts(session, 1 * 1000, 29 * 1000); [e6dcb14dbbd3e9e40a1f193a7bf6657e82b88cb9]
> > *always* fails on kfreebsd-amd64.

If it fails _reliably_ now, I consider that an improvement!
I'll try to test all of the above and see how often each one fails.

Nikos Mavrogiannopoulos wrote:
> It would be nice to have some debugging output of the failed test
> (e.g., run with -v). Is that a 32-bit system? I'm wondering whether it
> relates to the undefined behavior fixes.

I've also attached a log of `tests/mini-loss-time -v`, from a
kfreebsd-amd64 system after I built Andreas' gnutls28/3.4.10-1 package
from experimental.

Thanks,
Regards,
-- 
Steven Chamberlain
steven at pyro.eu.org
-------------- next part --------------
A non-text attachment was scrubbed...
Name: gnutls28.diff
Type: text/x-diff
Size: 572 bytes
Desc: not available
URL: </pipermail/attachments/20160305/664f3a23/attachment.diff>
-------------- next part --------------
0.000020 
0.141000 Will discard server packet 2
0.141029 client|<5>| REC[0x621b20]: Allocating epoch #0
0.141044 client|<3>| ASSERT: gnutls_constate.c:596
0.141057 client|<5>| REC[0x621b20]: Allocating epoch #1
0.141070 server|<5>| REC[0x621b20]: Allocating epoch #0
0.141084 client|<4>| HSK[0x621b20]: Keeping ciphersuite: GNUTLS_ECDH_ANON_AES_128_CBC_SHA1 (C0.18)
0.141098 client|<4>| HSK[0x621b20]: Keeping ciphersuite: GNUTLS_ECDH_ANON_AES_256_CBC_SHA1 (C0.19)
0.141111 client|<4>| HSK[0x621b20]: Keeping ciphersuite: GNUTLS_ECDH_ANON_3DES_EDE_CBC_SHA1 (C0.17)
0.141124 client|<4>| EXT[0x621b20]: Sending extension EXT MASTER SECRET (0 bytes)
0.141137 client|<4>| EXT[0x621b20]: Sending extension STATUS REQUEST (5 bytes)
0.141150 client|<4>| EXT[0x621b20]: Sending extension SAFE RENEGOTIATION (1 bytes)
0.141163 client|<4>| EXT[0x621b20]: Sending extension SESSION TICKET (0 bytes)
0.141177 client|<4>| EXT[0x621b20]: Sending extension SUPPORTED ECC (12 bytes)
0.141191 client|<4>| EXT[0x621b20]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
0.141204 client|<4>| HSK[0x621b20]: CLIENT HELLO was queued [104 bytes]
0.141217 client|<11>| HWRITE: enqueued [CLIENT HELLO] 104. Total 104 bytes.
0.141236 client|<11>| HWRITE FLUSH: 104 bytes in buffer.
0.141250 client|<6>| DTLS[0x621b20]: Start of flight transmission.
0.141263 client|<6>| DTLS[0x621b20]: Sending Packet[0] fragment CLIENT HELLO(1) with length: 92, offset: 0, fragment length: 92
0.141277 client|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 104 and min pad: 0
0.141291 client|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
0.141304 server|<3>| ASSERT: gnutls_constate.c:596
0.141316 client|<11>| WRITE: enqueued 117 bytes for 0x5. Total 117 bytes.
0.141329 server|<5>| REC[0x621b20]: Allocating epoch #1
0.141342 client|<5>| REC[0x621b20]: Sent Packet[1] Handshake(22) in epoch 0 and length: 117
0.141355 client|<11>| WRITE FLUSH: 117 bytes in buffer.
0.141369 client|<11>| WRITE: wrote 117 bytes, 0 bytes left.
0.141389 server|<3>| ASSERT: gnutls_buffers.c:1158
0.141405 server|<10>| READ: Got 117 bytes from 0x4
0.141423 server|<10>| READ: read 117 bytes from 0x4
0.141436 server|<10>| RB: Have 0 bytes into buffer. Adding 117 bytes.
0.141449 server|<10>| RB: Requested 13 bytes
0.141469 server|<5>| REC[0x621b20]: SSL 254.255 Handshake packet received. Epoch 0, length: 104
0.141482 server|<5>| REC[0x621b20]: Expected Packet Handshake(22)
0.141496 server|<5>| REC[0x621b20]: Received Packet Handshake(22) with length: 104
0.141509 server|<5>| REC[0x621b20]: Decrypted Packet[0.0] Handshake(22) with length: 104
0.141522 server|<13>| BUF[REC]: Inserted 104 bytes of Data(22)
0.141534 server|<4>| HSK[0x621b20]: CLIENT HELLO (1) was received. Length 92[92], frag offset 0, frag length: 92, sequence: 0
0.141547 server|<4>| HSK[0x621b20]: Client's version: 254.255
0.141560 server|<4>| HSK[0x621b20]: Selected version DTLS1.0
0.141574 server|<3>| ASSERT: gnutls_db.c:263
0.141586 server|<4>| EXT[0x621b20]: Found extension 'EXT MASTER SECRET/23'
0.141600 server|<4>| EXT[0x621b20]: Found extension 'STATUS REQUEST/5'
0.141615 server|<4>| EXT[0x621b20]: Found extension 'SAFE RENEGOTIATION/65281'
0.141628 server|<4>| EXT[0x621b20]: Found extension 'SESSION TICKET/35'
0.141641 server|<4>| EXT[0x621b20]: Found extension 'SUPPORTED ECC/10'
0.141654 server|<4>| EXT[0x621b20]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
0.141672 server|<4>| EXT[0x621b20]: Parsing extension 'EXT MASTER SECRET/23' (0 bytes)
0.141685 server|<4>| EXT[0x621b20]: Found extension 'STATUS REQUEST/5'
0.141698 server|<4>| EXT[0x621b20]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
0.141712 server|<4>| EXT[0x621b20]: Parsing extension 'SESSION TICKET/35' (0 bytes)
0.141725 server|<4>| EXT[0x621b20]: Found extension 'SUPPORTED ECC/10'
0.141738 server|<4>| EXT[0x621b20]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
0.141750 server|<4>| EXT[0x621b20]: Found extension 'EXT MASTER SECRET/23'
0.141763 server|<4>| EXT[0x621b20]: Parsing extension 'STATUS REQUEST/5' (5 bytes)
0.141776 server|<4>| EXT[0x621b20]: Found extension 'SAFE RENEGOTIATION/65281'
0.141862 server|<4>| EXT[0x621b20]: Found extension 'SESSION TICKET/35'
0.141936 server|<4>| EXT[0x621b20]: Parsing extension 'SUPPORTED ECC/10' (12 bytes)
0.141951 server|<4>| HSK[0x621b20]: Selected ECC curve SECP256R1 (2)
0.141964 server|<4>| EXT[0x621b20]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes)
0.141977 server|<4>| HSK[0x621b20]: Keeping ciphersuite: GNUTLS_ECDH_ANON_AES_128_CBC_SHA1 (C0.18)
0.141991 server|<4>| HSK[0x621b20]: Keeping ciphersuite: GNUTLS_ECDH_ANON_AES_256_CBC_SHA1 (C0.19)
0.142003 server|<4>| HSK[0x621b20]: Keeping ciphersuite: GNUTLS_ECDH_ANON_3DES_EDE_CBC_SHA1 (C0.17)
0.142016 server|<4>| HSK[0x621b20]: Requested cipher suites[size: 6]: 
0.142029 server|<4>| 	0xc0, 0x18 ECDH_ANON_AES_128_CBC_SHA1
0.142042 server|<4>| HSK[0x621b20]: Selected cipher suite: ECDH_ANON_AES_128_CBC_SHA1
0.142055 server|<4>| HSK[0x621b20]: Selected Compression Method: NULL
0.142068 server|<4>| HSK[0x621b20]: Safe renegotiation succeeded
0.142080 server|<4>| EXT[0x621b20]: Sending extension EXT MASTER SECRET (0 bytes)
0.142093 server|<3>| ASSERT: status_request.c:215
0.142105 server|<4>| EXT[0x621b20]: Sending extension SAFE RENEGOTIATION (1 bytes)
0.142118 server|<4>| EXT[0x621b20]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
0.142131 server|<4>| HSK[0x621b20]: SessionID: 24a5fefe8afb4aa2d197cc025b49579abe5c93323e7d90cb04d19af4dd59ef98
0.142143 server|<4>| HSK[0x621b20]: SERVER HELLO was queued [99 bytes]
0.142156 server|<11>| HWRITE: enqueued [SERVER HELLO] 99. Total 99 bytes.
0.142168 server|<4>| HSK[0x621b20]: SERVER KEY EXCHANGE was queued [81 bytes]
0.142181 server|<11>| HWRITE: enqueued [SERVER KEY EXCHANGE] 81. Total 180 bytes.
0.142194 server|<4>| HSK[0x621b20]: SERVER HELLO DONE was queued [12 bytes]
0.142206 server|<11>| HWRITE: enqueued [SERVER HELLO DONE] 12. Total 192 bytes.
0.142219 server|<11>| HWRITE FLUSH: 192 bytes in buffer.
0.142232 server|<6>| DTLS[0x621b20]: Start of flight transmission.
0.142245 server|<6>| DTLS[0x621b20]: Sending Packet[0] fragment SERVER HELLO(2) with length: 87, offset: 0, fragment length: 87
0.142258 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 99 and min pad: 0
0.142271 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
0.142284 server|<11>| WRITE: enqueued 112 bytes for 0x4. Total 112 bytes.
0.142296 server|<5>| REC[0x621b20]: Sent Packet[1] Handshake(22) in epoch 0 and length: 112
0.142309 server|<6>| DTLS[0x621b20]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 69, offset: 0, fragment length: 69
0.142324 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
0.142337 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
0.142349 server|<11>| WRITE: enqueued 94 bytes for 0x4. Total 206 bytes.
0.142362 server|<5>| REC[0x621b20]: Sent Packet[2] Handshake(22) in epoch 0 and length: 94
0.142375 server|<6>| DTLS[0x621b20]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0
0.142387 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 12 and min pad: 0
0.142400 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
0.142412 server|<11>| WRITE: enqueued 25 bytes for 0x4. Total 231 bytes.
0.142426 server|<5>| REC[0x621b20]: Sent Packet[3] Handshake(22) in epoch 0 and length: 25
0.142439 server|<11>| WRITE FLUSH: 231 bytes in buffer.
0.142452 Discarding packet 2: Server Key exchange
0.142470 Discarding packet 1: Server Hello Done
0.142483 server|<11>| WRITE: wrote 231 bytes, 0 bytes left.
0.142495 client|<10>| READ: Got 112 bytes from 0x5
0.142508 client|<10>| READ: read 112 bytes from 0x5
0.142521 client|<10>| RB: Have 0 bytes into buffer. Adding 112 bytes.
0.142533 client|<10>| RB: Requested 13 bytes
0.142549 client|<5>| REC[0x621b20]: SSL 254.255 Handshake packet received. Epoch 0, length: 99
0.142562 client|<5>| REC[0x621b20]: Expected Packet Handshake(22)
0.142575 client|<5>| REC[0x621b20]: Received Packet Handshake(22) with length: 99
0.142588 client|<5>| REC[0x621b20]: Decrypted Packet[0.0] Handshake(22) with length: 99
0.142600 client|<13>| BUF[REC]: Inserted 99 bytes of Data(22)
0.142613 client|<4>| HSK[0x621b20]: SERVER HELLO (2) was received. Length 87[87], frag offset 0, frag length: 87, sequence: 0
0.142635 client|<6>| DTLS[0x621b20]: End of flight transmission.
0.142649 client|<3>| ASSERT: gnutls_buffers.c:1115
0.142661 client|<3>| ASSERT: gnutls_buffers.c:1374
0.142674 client|<3>| ASSERT: gnutls_buffers.c:1374
0.142687 client|<4>| HSK[0x621b20]: Server's version: 254.255
0.142699 client|<4>| HSK[0x621b20]: SessionID length: 32
0.142712 client|<4>| HSK[0x621b20]: SessionID: 24a5fefe8afb4aa2d197cc025b49579abe5c93323e7d90cb04d19af4dd59ef98
0.142725 client|<4>| HSK[0x621b20]: Selected cipher suite: ECDH_ANON_AES_128_CBC_SHA1
0.142738 client|<4>| HSK[0x621b20]: Selected compression method: NULL (0)
0.142751 client|<4>| EXT[0x621b20]: Parsing extension 'EXT MASTER SECRET/23' (0 bytes)
0.142763 client|<4>| EXT[0x621b20]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
0.142776 client|<4>| EXT[0x621b20]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes)
0.142789 client|<4>| HSK[0x621b20]: Safe renegotiation succeeded
0.142801 client|<3>| ASSERT: gnutls_buffers.c:1158
1.020882 server|<6>| DTLS[0x621b20]: re-Start of flight transmission.
1.021037 server|<6>| DTLS[0x621b20]: Sending Packet[0] fragment SERVER HELLO(2) with length: 87, offset: 0, fragment length: 87
1.021136 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 99 and min pad: 0
1.021150 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
1.021165 server|<11>| WRITE: enqueued 112 bytes for 0x4. Total 112 bytes.
1.021178 server|<5>| REC[0x621b20]: Sent Packet[4] Handshake(22) in epoch 0 and length: 112
1.021192 server|<6>| DTLS[0x621b20]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 69, offset: 0, fragment length: 69
1.021205 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
1.021219 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
1.021232 server|<11>| WRITE: enqueued 94 bytes for 0x4. Total 206 bytes.
1.021245 server|<5>| REC[0x621b20]: Sent Packet[5] Handshake(22) in epoch 0 and length: 94
1.021259 server|<6>| DTLS[0x621b20]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0
1.021273 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 12 and min pad: 0
1.021287 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
1.021300 server|<11>| WRITE: enqueued 25 bytes for 0x4. Total 231 bytes.
1.021313 server|<5>| REC[0x621b20]: Sent Packet[6] Handshake(22) in epoch 0 and length: 25
1.021326 server|<11>| WRITE FLUSH: 231 bytes in buffer.
1.021339 Discarding packet 1: Server Hello
1.021354 Discarding packet 1: Server Key exchange
1.021367 Discarding packet 1: Server Hello Done
1.021379 server|<11>| WRITE: wrote 231 bytes, 0 bytes left.
2.025506 server|<11>| WRITE FLUSH: 0 bytes in buffer.
2.025634 server|<3>| ASSERT: gnutls_buffers.c:695
4.034434 server|<6>| DTLS[0x621b20]: re-Start of flight transmission.
4.034562 server|<6>| DTLS[0x621b20]: Sending Packet[0] fragment SERVER HELLO(2) with length: 87, offset: 0, fragment length: 87
4.034581 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 99 and min pad: 0
4.034597 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
4.034610 server|<11>| WRITE: enqueued 112 bytes for 0x4. Total 112 bytes.
4.034622 server|<5>| REC[0x621b20]: Sent Packet[7] Handshake(22) in epoch 0 and length: 112
4.034635 server|<6>| DTLS[0x621b20]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 69, offset: 0, fragment length: 69
4.034648 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
4.034661 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
4.034673 server|<11>| WRITE: enqueued 94 bytes for 0x4. Total 206 bytes.
4.034686 server|<5>| REC[0x621b20]: Sent Packet[8] Handshake(22) in epoch 0 and length: 94
4.034701 server|<6>| DTLS[0x621b20]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0
4.034714 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 12 and min pad: 0
4.034727 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
4.034741 server|<11>| WRITE: enqueued 25 bytes for 0x4. Total 231 bytes.
4.034754 server|<5>| REC[0x621b20]: Sent Packet[9] Handshake(22) in epoch 0 and length: 25
4.034767 server|<11>| WRITE FLUSH: 231 bytes in buffer.
4.034789 Discarding packet 1: Server Hello
4.034805 Discarding packet 1: Server Key exchange
4.034818 Discarding packet 1: Server Hello Done
4.034832 server|<11>| WRITE: wrote 231 bytes, 0 bytes left.
6.035732 server|<11>| WRITE FLUSH: 0 bytes in buffer.
6.035850 server|<3>| ASSERT: gnutls_buffers.c:695
10.051089 server|<6>| DTLS[0x621b20]: re-Start of flight transmission.
10.051208 server|<6>| DTLS[0x621b20]: Sending Packet[0] fragment SERVER HELLO(2) with length: 87, offset: 0, fragment length: 87
10.051223 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 99 and min pad: 0
10.051237 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
10.051250 server|<11>| WRITE: enqueued 112 bytes for 0x4. Total 112 bytes.
10.051262 server|<5>| REC[0x621b20]: Sent Packet[10] Handshake(22) in epoch 0 and length: 112
10.051275 server|<6>| DTLS[0x621b20]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 69, offset: 0, fragment length: 69
10.051288 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
10.051301 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
10.051314 server|<11>| WRITE: enqueued 94 bytes for 0x4. Total 206 bytes.
10.051327 server|<5>| REC[0x621b20]: Sent Packet[11] Handshake(22) in epoch 0 and length: 94
10.051340 server|<6>| DTLS[0x621b20]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0
10.051353 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 12 and min pad: 0
10.051366 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
10.051379 server|<11>| WRITE: enqueued 25 bytes for 0x4. Total 231 bytes.
10.051392 server|<5>| REC[0x621b20]: Sent Packet[12] Handshake(22) in epoch 0 and length: 25
10.051405 server|<11>| WRITE FLUSH: 231 bytes in buffer.
10.051418 Discarding packet 1: Server Hello
10.051431 Discarding packet 1: Server Key exchange
10.051444 Discarding packet 1: Server Hello Done
10.051465 server|<11>| WRITE: wrote 231 bytes, 0 bytes left.
14.056767 server|<11>| WRITE FLUSH: 0 bytes in buffer.
14.056890 server|<3>| ASSERT: gnutls_buffers.c:695
22.065525 server|<6>| DTLS[0x621b20]: re-Start of flight transmission.
22.065645 server|<6>| DTLS[0x621b20]: Sending Packet[0] fragment SERVER HELLO(2) with length: 87, offset: 0, fragment length: 87
22.065665 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 99 and min pad: 0
22.065679 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
22.065692 server|<11>| WRITE: enqueued 112 bytes for 0x4. Total 112 bytes.
22.065705 server|<5>| REC[0x621b20]: Sent Packet[13] Handshake(22) in epoch 0 and length: 112
22.065718 server|<6>| DTLS[0x621b20]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 69, offset: 0, fragment length: 69
22.065731 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 81 and min pad: 0
22.065743 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
22.065756 server|<11>| WRITE: enqueued 94 bytes for 0x4. Total 206 bytes.
22.065769 server|<5>| REC[0x621b20]: Sent Packet[14] Handshake(22) in epoch 0 and length: 94
22.065781 server|<6>| DTLS[0x621b20]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0
22.065795 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 12 and min pad: 0
22.065808 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
22.065821 server|<11>| WRITE: enqueued 25 bytes for 0x4. Total 231 bytes.
22.065834 server|<5>| REC[0x621b20]: Sent Packet[15] Handshake(22) in epoch 0 and length: 25
22.065848 server|<11>| WRITE FLUSH: 231 bytes in buffer.
22.065861 Discarding packet 1: Server Hello
22.065875 Discarding packet 1: Server Key exchange
22.065887 Discarding packet 1: Server Hello Done
22.065900 server|<11>| WRITE: wrote 231 bytes, 0 bytes left.
30.067663 server|<6>| Session timeout: 30102 ms
30.067793 server|<3>| ASSERT: gnutls_dtls.c:294
30.067812 server|<6>| DTLS[0x621b20]: End of flight transmission.
30.067826 server|<3>| ASSERT: gnutls_handshake.c:3193
30.067839 server|<5>| REC[0x621b20]: Start of epoch cleanup
30.067852 server|<5>| REC[0x621b20]: End of epoch cleanup
30.067865 server|<5>| REC[0x621b20]: Epoch #0 freed
30.067878 server|<5>| REC[0x621b20]: Epoch #1 freed
30.067890 server received timeout
30.068681 client|<10>| READ_TIMEOUT: -1 returned from 0x5, errno=4 (timeout: 31000)
30.068747 client|<3>| ASSERT: gnutls_buffers.c:252
30.068760 client|<3>| ASSERT: gnutls_buffers.c:588
30.068776 client|<3>| ASSERT: gnutls_kx.c:463
30.122652 client|<3>| ASSERT: gnutls_buffers.c:1158
30.122731 client|<10>| READ: -1 returned from 0x5, errno=54
30.122749 client|<3>| ASSERT: gnutls_buffers.c:228
30.122764 client|<3>| ASSERT: gnutls_buffers.c:588
30.122777 client|<3>| ASSERT: gnutls_record.c:1038
30.122790 client|<3>| ASSERT: gnutls_record.c:1158
30.122803 client|<3>| ASSERT: gnutls_buffers.c:1409
30.122816 client|<3>| ASSERT: gnutls_handshake.c:1446
30.122829 client|<3>| ASSERT: gnutls_kx.c:463
30.122841 client|<3>| ASSERT: gnutls_handshake.c:2798
30.122854 client|<5>| REC[0x621b20]: Start of epoch cleanup
30.122867 client|<5>| REC[0x621b20]: End of epoch cleanup
30.122881 client|<5>| REC[0x621b20]: Epoch #0 freed
30.122911 client|<5>| REC[0x621b20]: Epoch #1 freed
30.122928 client: Handshake failed with unexpected reason: Error in the push function.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 473 bytes
Desc: Digital signature
URL: </pipermail/attachments/20160305/664f3a23/attachment.sig>


More information about the Gnutls-devel mailing list