[gnutls-devel] GnuTLS | gnutls_record_send() fails with GNUTLS_E_INVALID_REQUEST (#823)
Development of GNU's TLS library
gnutls-devel at lists.gnutls.org
Wed Aug 28 22:16:16 CEST 2019
Guido Trentalancia commented:
Example of a GOOD session browsing https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases (example of a BAD session is provided next):
GTLS: Keeping ciphersuite c0.2f (GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256)
GTLS: Keeping ciphersuite c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1)
GTLS: Keeping ciphersuite 00.9d (GNUTLS_RSA_AES_256_GCM_SHA384)
GTLS: Keeping ciphersuite c0.9d (GNUTLS_RSA_AES_256_CCM)
GTLS: Keeping ciphersuite 00.35 (GNUTLS_RSA_AES_256_CBC_SHA1)
GTLS: Keeping ciphersuite 00.9c (GNUTLS_RSA_AES_128_GCM_SHA256)
GTLS: Keeping ciphersuite c0.9c (GNUTLS_RSA_AES_128_CCM)
GTLS: Keeping ciphersuite 00.2f (GNUTLS_RSA_AES_128_CBC_SHA1)
GTLS: Keeping ciphersuite 00.9f (GNUTLS_DHE_RSA_AES_256_GCM_SHA384)
GTLS: Keeping ciphersuite cc.aa (GNUTLS_DHE_RSA_CHACHA20_POLY1305)
GTLS: Keeping ciphersuite c0.9f (GNUTLS_DHE_RSA_AES_256_CCM)
GTLS: Keeping ciphersuite 00.39 (GNUTLS_DHE_RSA_AES_256_CBC_SHA1)
GTLS: Keeping ciphersuite 00.9e (GNUTLS_DHE_RSA_AES_128_GCM_SHA256)
GTLS: Keeping ciphersuite c0.9e (GNUTLS_DHE_RSA_AES_128_CCM)
GTLS: Keeping ciphersuite 00.33 (GNUTLS_DHE_RSA_AES_128_CBC_SHA1)
GTLS: EXT[0x2466b70]: Preparing extension (Maximum Record Size/1) for 'client hello'
GTLS: EXT[0x2466b70]: Preparing extension (OCSP Status Request/5) for 'client hello'
GTLS: EXT[0x2466b70]: Sending extension OCSP Status Request/5 (5 bytes)
GTLS: EXT[0x2466b70]: Preparing extension (Supported Groups/10) for 'client hello'
GTLS: EXT[0x2466b70]: Sent group SECP256R1 (0x17)
GTLS: EXT[0x2466b70]: Sent group SECP384R1 (0x18)
GTLS: EXT[0x2466b70]: Sent group SECP521R1 (0x19)
GTLS: EXT[0x2466b70]: Sent group X25519 (0x1d)
GTLS: EXT[0x2466b70]: Sent group FFDHE2048 (0x100)
GTLS: EXT[0x2466b70]: Sent group FFDHE3072 (0x101)
GTLS: EXT[0x2466b70]: Sent group FFDHE4096 (0x102)
GTLS: EXT[0x2466b70]: Sent group FFDHE8192 (0x104)
GTLS: EXT[0x2466b70]: Sending extension Supported Groups/10 (18 bytes)
GTLS: EXT[0x2466b70]: Preparing extension (Supported EC Point Formats/11) for 'client hello'
GTLS: EXT[0x2466b70]: Sending extension Supported EC Point Formats/11 (2 bytes)
GTLS: EXT[0x2466b70]: Preparing extension (SRP/12) for 'client hello'
GTLS: EXT[0x2466b70]: Preparing extension (Signature Algorithms/13) for 'client hello'
GTLS: EXT[0x2466b70]: sent signature algo (4.1) RSA-SHA256
GTLS: EXT[0x2466b70]: sent signature algo (8.9) RSA-PSS-SHA256
GTLS: EXT[0x2466b70]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
GTLS: EXT[0x2466b70]: sent signature algo (4.3) ECDSA-SHA256
GTLS: EXT[0x2466b70]: sent signature algo (8.7) EdDSA-Ed25519
GTLS: EXT[0x2466b70]: sent signature algo (5.1) RSA-SHA384
GTLS: EXT[0x2466b70]: sent signature algo (8.10) RSA-PSS-SHA384
GTLS: EXT[0x2466b70]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
GTLS: EXT[0x2466b70]: sent signature algo (5.3) ECDSA-SHA384
GTLS: EXT[0x2466b70]: sent signature algo (6.1) RSA-SHA512
GTLS: EXT[0x2466b70]: sent signature algo (8.11) RSA-PSS-SHA512
GTLS: EXT[0x2466b70]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
GTLS: EXT[0x2466b70]: sent signature algo (6.3) ECDSA-SHA512
GTLS: EXT[0x2466b70]: sent signature algo (2.1) RSA-SHA1
GTLS: EXT[0x2466b70]: sent signature algo (2.3) ECDSA-SHA1
GTLS: EXT[0x2466b70]: Sending extension Signature Algorithms/13 (32 bytes)
GTLS: EXT[0x2466b70]: Preparing extension (SRTP/14) for 'client hello'
GTLS: EXT[0x2466b70]: Preparing extension (Heartbeat/15) for 'client hello'
GTLS: EXT[0x2466b70]: Preparing extension (ALPN/16) for 'client hello'
GTLS: EXT[0x2466b70]: Preparing extension (Encrypt-then-MAC/22) for 'client hello'
GTLS: EXT[0x2466b70]: Preparing extension (Extended Master Secret/23) for 'client hello'
GTLS: EXT[0x2466b70]: Preparing extension (Session Ticket/35) for 'client hello'
GTLS: EXT[0x2466b70]: Sending extension Session Ticket/35 (0 bytes)
GTLS: EXT[0x2466b70]: Preparing extension (Key Share/51) for 'client hello'
GTLS: EXT[0x2466b70]: Preparing extension (Supported Versions/43) for 'client hello'
GTLS: EXT[0x2466b70]: Preparing extension (Post Handshake Auth/49) for 'client hello'
GTLS: EXT[0x2466b70]: Preparing extension (Safe Renegotiation/65281) for 'client hello'
GTLS: EXT[0x2466b70]: Sending extension Safe Renegotiation/65281 (1 bytes)
GTLS: EXT[0x2466b70]: Preparing extension (Server Name Indication/0) for 'client hello'
GTLS: HSK[0x2466b70]: sent server name: 'github.githubassets.com'
GTLS: EXT[0x2466b70]: Sending extension Server Name Indication/0 (28 bytes)
GTLS: EXT[0x2466b70]: Preparing extension (Cookie/44) for 'client hello'
GTLS: EXT[0x2466b70]: Preparing extension (PSK Key Exchange Modes/45) for 'client hello'
GTLS: EXT[0x2466b70]: Preparing extension (ClientHello Padding/21) for 'client hello'
GTLS: EXT[0x2466b70]: Preparing extension (Pre Shared Key/41) for 'client hello'
GTLS: HSK[0x2466b70]: CLIENT HELLO was queued [209 bytes]
GTLS: REC[0x2466b70]: Preparing Packet Handshake(22) with length: 209 and min pad: 0
GTLS: ENC[0x2466b70]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
GTLS: REC[0x2466b70]: Sent Packet[1] Handshake(22) in epoch 0 and length: 214
GTLS: ASSERT: buffers.c[get_last_packet]:1172
GTLS: REC[0x21cd300]: SSL 3.3 Handshake packet received. Epoch 0, length: 69
GTLS: REC[0x21cd300]: Expected Packet Handshake(22)
GTLS: REC[0x21cd300]: Received Packet Handshake(22) with length: 69
GTLS: REC[0x21cd300]: Decrypted Packet[0] Handshake(22) with length: 69
GTLS: HSK[0x21cd300]: SERVER HELLO (2) was received. Length 65[65], frag offset 0, frag length: 65, sequence: 0
GTLS: ASSERT: buffers.c[get_last_packet]:1163
GTLS: ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1392
GTLS: HSK[0x21cd300]: Server's version: 3.3
GTLS: HSK[0x21cd300]: SessionID length: 0
GTLS: HSK[0x21cd300]: SessionID: c0
GTLS: HSK[0x21cd300]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256
GTLS: EXT[0x21cd300]: Parsing extension 'Safe Renegotiation/65281' (1 bytes)
GTLS: EXT[0x21cd300]: Parsing extension 'Server Name Indication/0' (0 bytes)
GTLS: EXT[0x21cd300]: Parsing extension 'Supported EC Point Formats/11' (4 bytes)
GTLS: EXT[0x21cd300]: Parsing extension 'Session Ticket/35' (0 bytes)
GTLS: EXT[0x21cd300]: Parsing extension 'OCSP Status Request/5' (0 bytes)
GTLS: HSK[0x21cd300]: Safe renegotiation succeeded
GTLS: ASSERT: buffers.c[get_last_packet]:1172
GTLS: REC[0x21cd300]: SSL 3.3 Handshake packet received. Epoch 0, length: 2991
GTLS: REC[0x21cd300]: Expected Packet Handshake(22)
GTLS: REC[0x21cd300]: Received Packet Handshake(22) with length: 2991
GTLS: REC[0x21cd300]: Decrypted Packet[1] Handshake(22) with length: 2991
GTLS: HSK[0x21cd300]: CERTIFICATE (11) was received. Length 2987[2987], frag offset 0, frag length: 2987, sequence: 0
GTLS: ASSERT: buffers.c[get_last_packet]:1172
GTLS: REC[0x21cd300]: SSL 3.3 Handshake packet received. Epoch 0, length: 479
GTLS: REC[0x21cd300]: Expected Packet Handshake(22)
GTLS: REC[0x21cd300]: Received Packet Handshake(22) with length: 479
GTLS: REC[0x21cd300]: Decrypted Packet[2] Handshake(22) with length: 479
GTLS: HSK[0x21cd300]: CERTIFICATE STATUS (22) was received. Length 475[475], frag offset 0, frag length: 475, sequence: 0
GTLS: ASSERT: buffers.c[get_last_packet]:1172
GTLS: REC[0x21cd300]: SSL 3.3 Handshake packet received. Epoch 0, length: 300
GTLS: REC[0x21cd300]: Expected Packet Handshake(22)
GTLS: REC[0x21cd300]: Received Packet Handshake(22) with length: 300
GTLS: REC[0x21cd300]: Decrypted Packet[3] Handshake(22) with length: 300
GTLS: HSK[0x21cd300]: SERVER KEY EXCHANGE (12) was received. Length 296[296], frag offset 0, frag length: 296, sequence: 0
GTLS: received curve X25519
GTLS: HSK[0x21cd300]: Selected group X25519 (6)
GTLS: HSK[0x21cd300]: verify TLS 1.2 handshake data: using RSA-SHA512
GTLS: ASSERT: buffers.c[get_last_packet]:1172
GTLS: REC[0x21cd300]: SSL 3.3 Handshake packet received. Epoch 0, length: 4
GTLS: REC[0x21cd300]: Expected Packet Handshake(22)
GTLS: REC[0x21cd300]: Received Packet Handshake(22) with length: 4
GTLS: REC[0x21cd300]: Decrypted Packet[4] Handshake(22) with length: 4
GTLS: HSK[0x21cd300]: SERVER HELLO DONE (14) was received. Length 0[0], frag offset 0, frag length: 1, sequence: 0
GTLS: ASSERT: buffers.c[get_last_packet]:1163
GTLS: ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1392
GTLS: HSK[0x21cd300]: CLIENT KEY EXCHANGE was queued [37 bytes]
GTLS: REC[0x21cd300]: Sent ChangeCipherSpec
GTLS: INT: PREMASTER SECRET[32]: c4ebcba2abd9e9dc6a26510b9f917fb0b06ae0bf1e4566d4fdd1f6684704062e
GTLS: INT: CLIENT RANDOM[32]: 0122190e3830216f3b777a6c2e08dbdfbd548f78edec1e72a562fa6ded2832d7
GTLS: INT: SERVER RANDOM[32]: 7e0c260a55c8d66de977fdd82444a124f817225d920d0ea4ecccd4e5d8c98fdd
GTLS: REC[0x21defc0]: SSL 3.3 Handshake packet received. Epoch 0, length: 93
GTLS: REC[0x21defc0]: Expected Packet Handshake(22)
GTLS: REC[0x21defc0]: Received Packet Handshake(22) with length: 93
GTLS: INT: MASTER SECRET: 5ae24a9ebe3852011bd5f9bab69020992afed9616d49fd27b2b987e09199ba7207e1257b29b3fb7fbdd2ba48ff93b69b
GTLS: REC[0x21cd300]: Initializing epoch #1
GTLS: REC[0x21defc0]: Decrypted Packet[0] Handshake(22) with length: 93
GTLS: INT: KEY BLOCK[40]: 1be31f7e53c25cf87a5fb83136703a3ac9dc7251c920f02fab75829dd2e66fb6
GTLS: HSK[0x21defc0]: SERVER HELLO (2) was received. Length 89[89], frag offset 0, frag length: 89, sequence: 0
GTLS: INT: CLIENT WRITE KEY [16]: 1be31f7e53c25cf87a5fb83136703a3a
GTLS: ASSERT: buffers.c[get_last_packet]:1163
GTLS: ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1392
GTLS: INT: SERVER WRITE KEY [16]: c9dc7251c920f02fab75829dd2e66fb6
GTLS: HSK[0x21defc0]: Server's version: 3.3
GTLS: INT: CLIENT WRITE IV [4]: 7810fed3
GTLS: HSK[0x21defc0]: SessionID length: 32
GTLS: INT: SERVER WRITE IV [4]: a090830e
GTLS: HSK[0x21defc0]: SessionID: 8070f5ddbc94bbb150f4ef6d1ca796a9314c9c81bffe03bc51e836f679f3d2b7
GTLS: HSK[0x21defc0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256
GTLS: EXT[0x21defc0]: Parsing extension 'Safe Renegotiation/65281' (1 bytes)
GTLS: REC[0x21cd300]: Epoch #1 ready
GTLS: EXT[0x21defc0]: Parsing extension 'Server Name Indication/0' (0 bytes)
GTLS: HSK[0x21cd300]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256
GTLS: EXT[0x21defc0]: Parsing extension 'Supported EC Point Formats/11' (4 bytes)
GTLS: HSK[0x21cd300]: Initializing internal [write] cipher sessions
GTLS: HSK[0x21defc0]: Safe renegotiation succeeded
GTLS: ASSERT: buffers.c[get_last_packet]:1172
GTLS: REC[0x21defc0]: SSL 3.3 Handshake packet received. Epoch 0, length: 3085
GTLS: REC[0x21defc0]: Expected Packet Handshake(22)
GTLS: REC[0x21defc0]: Received Packet Handshake(22) with length: 3085
GTLS: HSK[0x21cd300]: recording tls-unique CB (send)
GTLS: HSK[0x21cd300]: FINISHED was queued [16 bytes]
GTLS: REC[0x21cd300]: Preparing Packet Handshake(22) with length: 37 and min pad: 0
GTLS: ENC[0x21cd300]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
GTLS: REC[0x21cd300]: Sent Packet[2] Handshake(22) in epoch 0 and length: 42
GTLS: REC[0x21cd300]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
GTLS: ENC[0x21cd300]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
GTLS: REC[0x21cd300]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 6
GTLS: REC[0x21cd300]: Preparing Packet Handshake(22) with length: 16 and min pad: 0
GTLS: ENC[0x21cd300]: cipher: AES-128-GCM, MAC: AEAD, Epoch: 1
GTLS: REC[0x21cd300]: Sent Packet[1] Handshake(22) in epoch 1 and length: 45
GTLS: ASSERT: buffers.c[get_last_packet]:1172
GTLS: REC[0x21defc0]: Decrypted Packet[1] Handshake(22) with length: 3085
GTLS: HSK[0x21defc0]: CERTIFICATE (11) was received. Length 3081[3081], frag offset 0, frag length: 3081, sequence: 0
GTLS: ASSERT: buffers.c[get_last_packet]:1172
GTLS: REC[0x21defc0]: SSL 3.3 Handshake packet received. Epoch 0, length: 300
GTLS: REC[0x21defc0]: Expected Packet Handshake(22)
GTLS: REC[0x21defc0]: Received Packet Handshake(22) with length: 300
GTLS: REC[0x21defc0]: Decrypted Packet[2] Handshake(22) with length: 300
GTLS: HSK[0x21defc0]: SERVER KEY EXCHANGE (12) was received. Length 296[296], frag offset 0, frag length: 296, sequence: 0
GTLS: received curve X25519
GTLS: HSK[0x21defc0]: Selected group X25519 (6)
GTLS: HSK[0x21defc0]: verify TLS 1.2 handshake data: using RSA-PSS-RSAE-SHA256
GTLS: ASSERT: buffers.c[get_last_packet]:1172
GTLS: REC[0x21defc0]: SSL 3.3 Handshake packet received. Epoch 0, length: 4
GTLS: REC[0x21defc0]: Expected Packet Handshake(22)
GTLS: REC[0x21defc0]: Received Packet Handshake(22) with length: 4
GTLS: REC[0x21defc0]: Decrypted Packet[3] Handshake(22) with length: 4
GTLS: HSK[0x21defc0]: SERVER HELLO DONE (14) was received. Length 0[0], frag offset 0, frag length: 1, sequence: 0
GTLS: ASSERT: buffers.c[get_last_packet]:1163
GTLS: ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1392
GTLS: HSK[0x21defc0]: CLIENT KEY EXCHANGE was queued [37 bytes]
GTLS: REC[0x21defc0]: Sent ChangeCipherSpec
GTLS: INT: PREMASTER SECRET[32]: 1c3134ac5f7f88e5b51a9d5e7e7eaf6dcb13f155259720c3ba5956c52c221016
GTLS: INT: CLIENT RANDOM[32]: 05dec0fa9579c02eb7694598b35d40a29e0548031862272b897911c149798ea3
GTLS: INT: SERVER RANDOM[32]: 5941a25da4b7cca86c95cc618d4728f40932a4d0346033d9444f574e47524401
GTLS: INT: MASTER SECRET: 3e898ca8bdb70d08a706e46f450d4dd53273aab8b84328ab8497d9a03f76ba7bf0b2ae0223a910c88588bce9e0910b06
GTLS: REC[0x21defc0]: Initializing epoch #1
GTLS: INT: KEY BLOCK[40]: 7bad3fbc1c631b97fbda298c98fab59561c81551de1be1fb0910a43575e87d7b
GTLS: INT: CLIENT WRITE KEY [16]: 7bad3fbc1c631b97fbda298c98fab595
GTLS: INT: SERVER WRITE KEY [16]: 61c81551de1be1fb0910a43575e87d7b
GTLS: INT: CLIENT WRITE IV [4]: 0e90a140
GTLS: INT: SERVER WRITE IV [4]: 7b6d06b1
GTLS: REC[0x21defc0]: Epoch #1 ready
GTLS: HSK[0x21defc0]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256
GTLS: HSK[0x21defc0]: Initializing internal [write] cipher sessions
GTLS: HSK[0x21defc0]: recording tls-unique CB (send)
GTLS: HSK[0x21defc0]: FINISHED was queued [16 bytes]
GTLS: REC[0x21defc0]: Preparing Packet Handshake(22) with length: 37 and min pad: 0
GTLS: ENC[0x21defc0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
GTLS: REC[0x21defc0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 42
GTLS: REC[0x21defc0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
GTLS: ENC[0x21defc0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
GTLS: REC[0x21defc0]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 6
GTLS: REC[0x21defc0]: Preparing Packet Handshake(22) with length: 16 and min pad: 0
GTLS: ENC[0x21defc0]: cipher: AES-128-GCM, MAC: AEAD, Epoch: 1
GTLS: REC[0x21defc0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 45
GTLS: REC[0x2466b70]: SSL 3.3 Handshake packet received. Epoch 0, length: 69
GTLS: REC[0x2466b70]: Expected Packet Handshake(22)
GTLS: REC[0x2466b70]: Received Packet Handshake(22) with length: 69
GTLS: REC[0x2466b70]: Decrypted Packet[0] Handshake(22) with length: 69
GTLS: HSK[0x2466b70]: SERVER HELLO (2) was received. Length 65[65], frag offset 0, frag length: 65, sequence: 0
GTLS: ASSERT: buffers.c[get_last_packet]:1163
GTLS: ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1392
GTLS: HSK[0x2466b70]: Server's version: 3.3
GTLS: HSK[0x2466b70]: SessionID length: 0
GTLS: HSK[0x2466b70]: SessionID: c0
GTLS: HSK[0x2466b70]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256
GTLS: EXT[0x2466b70]: Parsing extension 'Safe Renegotiation/65281' (1 bytes)
GTLS: EXT[0x2466b70]: Parsing extension 'Server Name Indication/0' (0 bytes)
GTLS: EXT[0x2466b70]: Parsing extension 'Supported EC Point Formats/11' (4 bytes)
GTLS: EXT[0x2466b70]: Parsing extension 'Session Ticket/35' (0 bytes)
GTLS: EXT[0x2466b70]: Parsing extension 'OCSP Status Request/5' (0 bytes)
GTLS: HSK[0x2466b70]: Safe renegotiation succeeded
GTLS: ASSERT: buffers.c[get_last_packet]:1172
GTLS: REC[0x2466b70]: SSL 3.3 Handshake packet received. Epoch 0, length: 2991
GTLS: REC[0x2466b70]: Expected Packet Handshake(22)
GTLS: REC[0x2466b70]: Received Packet Handshake(22) with length: 2991
GTLS: REC[0x2466b70]: Decrypted Packet[1] Handshake(22) with length: 2991
GTLS: HSK[0x2466b70]: CERTIFICATE (11) was received. Length 2987[2987], frag offset 0, frag length: 2987, sequence: 0
GTLS: ASSERT: buffers.c[get_last_packet]:1172
GTLS: REC[0x2466b70]: SSL 3.3 Handshake packet received. Epoch 0, length: 479
GTLS: REC[0x2466b70]: Expected Packet Handshake(22)
GTLS: REC[0x2466b70]: Received Packet Handshake(22) with length: 479
GTLS: REC[0x2466b70]: Decrypted Packet[2] Handshake(22) with length: 479
GTLS: HSK[0x2466b70]: CERTIFICATE STATUS (22) was received. Length 475[475], frag offset 0, frag length: 475, sequence: 0
GTLS: ASSERT: buffers.c[get_last_packet]:1172
GTLS: REC[0x2466b70]: SSL 3.3 Handshake packet received. Epoch 0, length: 300
GTLS: REC[0x2466b70]: Expected Packet Handshake(22)
GTLS: REC[0x2466b70]: Received Packet Handshake(22) with length: 300
GTLS: REC[0x2466b70]: Decrypted Packet[3] Handshake(22) with length: 300
GTLS: HSK[0x2466b70]: SERVER KEY EXCHANGE (12) was received. Length 296[296], frag offset 0, frag length: 296, sequence: 0
GTLS: received curve X25519
GTLS: HSK[0x2466b70]: Selected group X25519 (6)
GTLS: HSK[0x2466b70]: verify TLS 1.2 handshake data: using RSA-SHA512
GTLS: ASSERT: buffers.c[get_last_packet]:1172
GTLS: REC[0x2466b70]: SSL 3.3 Handshake packet received. Epoch 0, length: 4
GTLS: REC[0x2466b70]: Expected Packet Handshake(22)
GTLS: REC[0x2466b70]: Received Packet Handshake(22) with length: 4
GTLS: REC[0x2466b70]: Decrypted Packet[4] Handshake(22) with length: 4
GTLS: HSK[0x2466b70]: SERVER HELLO DONE (14) was received. Length 0[0], frag offset 0, frag length: 1, sequence: 0
GTLS: ASSERT: buffers.c[get_last_packet]:1163
GTLS: ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1392
GTLS: HSK[0x2466b70]: CLIENT KEY EXCHANGE was queued [37 bytes]
GTLS: REC[0x2466b70]: Sent ChangeCipherSpec
GTLS: INT: PREMASTER SECRET[32]: b6a5f57b1724f4ef5096c4f9a161fc4214bf0ffd6a0ea545c8332fbcb4437639
GTLS: INT: CLIENT RANDOM[32]: a63f730a6248c99456ffd7b06e907820bd8fdea7f87e0a5a58ff09ea9a56d35c
GTLS: INT: SERVER RANDOM[32]: 05c7253a7e3600aa94feff6151fc5b83a3ba372c22c2158fc6beff47727ff895
GTLS: INT: MASTER SECRET: 1a6df3abea1288bc65b3226bfb311641a42693d5e6d03914882ccb7d485f9a7fa9251ac03673b08fd15ea034f5af4250
GTLS: REC[0x2466b70]: Initializing epoch #1
GTLS: INT: KEY BLOCK[40]: e584cae306bc473fd68ca9171efb94328138dff9093c560e12f88fd004c359cd
GTLS: INT: CLIENT WRITE KEY [16]: e584cae306bc473fd68ca9171efb9432
GTLS: INT: SERVER WRITE KEY [16]: 8138dff9093c560e12f88fd004c359cd
GTLS: INT: CLIENT WRITE IV [4]: 68d83539
GTLS: INT: SERVER WRITE IV [4]: 1745a265
GTLS: REC[0x2466b70]: Epoch #1 ready
GTLS: HSK[0x2466b70]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256
GTLS: HSK[0x2466b70]: Initializing internal [write] cipher sessions
GTLS: HSK[0x2466b70]: recording tls-unique CB (send)
GTLS: HSK[0x2466b70]: FINISHED was queued [16 bytes]
GTLS: REC[0x2466b70]: Preparing Packet Handshake(22) with length: 37 and min pad: 0
GTLS: ENC[0x2466b70]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
GTLS: REC[0x2466b70]: Sent Packet[2] Handshake(22) in epoch 0 and length: 42
GTLS: REC[0x2466b70]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
GTLS: ENC[0x2466b70]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
GTLS: REC[0x2466b70]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 6
GTLS: REC[0x2466b70]: Preparing Packet Handshake(22) with length: 16 and min pad: 0
GTLS: ENC[0x2466b70]: cipher: AES-128-GCM, MAC: AEAD, Epoch: 1
GTLS: REC[0x2466b70]: Sent Packet[1] Handshake(22) in epoch 1 and length: 45
GTLS: ASSERT: buffers.c[get_last_packet]:1172
GTLS: REC[0x21cd300]: SSL 3.3 Handshake packet received. Epoch 0, length: 202
GTLS: REC[0x21cd300]: Expected Packet Handshake(22)
GTLS: REC[0x21cd300]: Received Packet Handshake(22) with length: 202
GTLS: REC[0x21cd300]: Decrypted Packet[5] Handshake(22) with length: 202
GTLS: HSK[0x21cd300]: NEW SESSION TICKET (4) was received. Length 198[198], frag offset 0, frag length: 198, sequence: 0
GTLS: HSK[0x21cd300]: received session ticket
GTLS: REC[0x21cd300]: SSL 3.3 ChangeCipherSpec packet received. Epoch 0, length: 1
GTLS: REC[0x21cd300]: Expected Packet ChangeCipherSpec(20)
GTLS: REC[0x21cd300]: Received Packet ChangeCipherSpec(20) with length: 1
GTLS: REC[0x21cd300]: Decrypted Packet[6] ChangeCipherSpec(20) with length: 1
GTLS: HSK[0x21cd300]: Cipher Suite: GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256
GTLS: ASSERT: buffers.c[get_last_packet]:1172
GTLS: REC[0x21cd300]: SSL 3.3 Handshake packet received. Epoch 1, length: 40
GTLS: REC[0x21cd300]: Expected Packet Handshake(22)
GTLS: REC[0x21cd300]: Received Packet Handshake(22) with length: 40
GTLS: REC[0x21cd300]: Decrypted Packet[0] Handshake(22) with length: 16
GTLS: HSK[0x21cd300]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
GTLS: REC[0x21cd300]: Start of epoch cleanup
GTLS: REC[0x21cd300]: Epoch #0 freed
GTLS: REC[0x21cd300]: End of epoch cleanup
GTLS: ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:470
GTLS: ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:470
GTLS: REC[0x21cd300]: Preparing Packet Application Data(23) with length: 576 and min pad: 0
GTLS: ENC[0x21cd300]: cipher: AES-128-GCM, MAC: AEAD, Epoch: 1
GTLS: REC[0x21cd300]: Sent Packet[2] Application Data(23) in epoch 1 and length: 605
--
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/issues/823#note_209493642
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20190828/c1c55ee9/attachment-0001.html>
More information about the Gnutls-devel
mailing list