openpgpself

Simon Josefsson simon at josefsson.org
Tue Feb 26 10:34:44 CET 2008


Simon Josefsson <simon at josefsson.org> writes:

>> On 21 feb 2008, at 18.38, Nikos Mavrogiannopoulos wrote:
>>> Simon Josefsson wrote:
>>>> Hi!  I noticed that the openpgpself test failed.  I thought it was
>>>> because of using credentials from files, and fixed that (pushed in
>>>> git).
>>>> However, it still doesn't work... ideas?
>>> It works in my system both make check and run it by hand... My
>>> output is attached. If it still has the same problem could you
>>> send me the failed output?
>
> Interesting, I still had the same problem, I'll check it more
> tomorrow.  Maybe it was picking up the wrong libgnutls.so from the
> installed path, instead of the one from the build tree... I recall
> similar problems before.

It still fails for me.  I checked that it is using the newly built
libgnutls.so.  Here is the output.  Does this happen for anyone else?
Cc'ing gnutls-devel.

/Simon

client |<2>| Importing Openpgp key and using openpgp sub key: 837b6fb490ad0608
client |<2>| ASSERT: pgp.c:722
client |<2>| ASSERT: privkey.c:459
client |<2>| ASSERT: gnutls_openpgp.c:777
client |<2>| ASSERT: gnutls_openpgp.c:166
client |<2>| ASSERT: privkey.c:982
client |<2>| Importing Openpgp key and using main openpgp key.
client |<2>| ASSERT: pgp.c:1383
client |<2>| Importing Openpgp cert and using main openpgp key
client |<2>| ASSERT: pgp.c:133
client |<3>| HSK[806afe8]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
client |<3>| HSK[806afe8]: Keeping ciphersuite: RSA_ARCFOUR_MD5
client |<3>| HSK[806afe8]: Removing ciphersuite: PSK_SHA_AES_128_CBC_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: PSK_SHA_AES_256_CBC_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: PSK_SHA_ARCFOUR_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
client |<3>| HSK[806afe8]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
client |<2>| EXT[806afe8]: Sending extension CERT_TYPE
client |<3>| HSK[806afe8]: CLIENT HELLO was send [88 bytes]
client |<6>| BUF[HSK]: Peeked 0 bytes of Data
client |<6>| BUF[HSK]: Emptied buffer
client |<4>| REC[806afe8]: Sending Packet[0] Handshake(22) with length: 88
client |<7>| WRITE: Will write 93 bytes to 5.
client |<7>| WRITE: wrote 93 bytes to 5. Left 0 bytes. Total 93 bytes.
client |<7>| 0000 - 16 03 02 00 58 01 00 00 54 03 02 47 c3 dc db 8f 
client |<7>| 0001 - ff 83 ba 01 b8 17 33 ad 35 46 87 85 fb 98 22 d7 
client |<7>| 0002 - 6d 11 53 84 a6 e1 0f d1 07 79 82 00 00 24 00 33 
client |<7>| 0003 - 00 45 00 39 00 88 00 16 00 32 00 44 00 38 00 87 
client |<7>| 0004 - 00 13 00 66 00 2f 00 41 00 35 00 84 00 0a 00 05 
client |<7>| 0005 - 00 04 01 00 00 07 00 09 00 03 02 00 01 
client |<4>| REC[806afe8]: Sent Packet[1] Handshake(22) with length: 93
server |<7>| READ: Got 5 bytes from 5
server |<7>| READ: read 5 bytes from 5
server |<7>| 0000 - 16 03 02 00 58 
server |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
server |<7>| RB: Requested 5 bytes
server |<4>| REC[806adb8]: Expected Packet[0] Handshake(22) with length: 1
server |<4>| REC[806adb8]: Received Packet[0] Handshake(22) with length: 88
server |<7>| READ: Got 88 bytes from 5
server |<7>| READ: read 88 bytes from 5
server |<7>| 0000 - 01 00 00 54 03 02 47 c3 dc db 8f ff 83 ba 01 b8 
server |<7>| 0001 - 17 33 ad 35 46 87 85 fb 98 22 d7 6d 11 53 84 a6 
server |<7>| 0002 - e1 0f d1 07 79 82 00 00 24 00 33 00 45 00 39 00 
server |<7>| 0003 - 88 00 16 00 32 00 44 00 38 00 87 00 13 00 66 00 
server |<7>| 0004 - 2f 00 41 00 35 00 84 00 0a 00 05 00 04 01 00 00 
server |<7>| 0005 - 07 00 09 00 03 02 00 01 
server |<7>| RB: Have 5 bytes into buffer. Adding 88 bytes.
server |<7>| RB: Requested 93 bytes
server |<4>| REC[806adb8]: Decrypted Packet[0] Handshake(22) with length: 88
server |<6>| BUF[HSK]: Inserted 88 bytes of Data(22)
server |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
server |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
server |<3>| HSK[806adb8]: CLIENT HELLO was received [88 bytes]
server |<6>| BUF[REC][HD]: Read 84 bytes of Data(22)
server |<6>| BUF[HSK]: Peeked 0 bytes of Data
server |<6>| BUF[HSK]: Emptied buffer
server |<6>| BUF[HSK]: Inserted 4 bytes of Data
server |<6>| BUF[HSK]: Inserted 84 bytes of Data
server |<3>| HSK[806adb8]: Client's version: 3.2
server |<2>| ASSERT: gnutls_db.c:239
server |<2>| EXT[806adb8]: Received extension 'CERT_TYPE/9'
server |<2>| EXT[806adb8]: Received extension 'CERT_TYPE/9'
server |<2>| ASSERT: ext_cert_type.c:106
server |<2>| ASSERT: ext_cert_type.c:106
server |<2>| ASSERT: ext_cert_type.c:123
server |<2>| ASSERT: gnutls_handshake.c:2865
server |<1>| Could not find an appropriate certificate: Insufficient credentials for that request.
server |<3>| HSK[806adb8]: Removing ciphersuite: PSK_SHA_ARCFOUR_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: PSK_SHA_AES_128_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: PSK_SHA_AES_256_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: DHE_DSS_ARCFOUR_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: RSA_ARCFOUR_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: RSA_ARCFOUR_MD5
server |<3>| HSK[806adb8]: Removing ciphersuite: RSA_3DES_EDE_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: RSA_AES_128_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: RSA_AES_256_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
server |<3>| HSK[806adb8]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
server |<2>| ASSERT: gnutls_handshake.c:704
server |<2>| ASSERT: gnutls_handshake.c:462
server |<2>| ASSERT: gnutls_handshake.c:2014
server |<2>| ASSERT: gnutls_handshake.c:2542
server |<6>| BUF[HSK]: Cleared Data from buffer
client |<7>| READ: Got 0 bytes from 5
client |<7>| READ: read 0 bytes from 5
client |<7>| 0000 - 
client |<2>| ASSERT: gnutls_buffers.c:638
client |<2>| ASSERT: gnutls_record.c:907
client |<2>| ASSERT: gnutls_buffers.c:1152
client |<2>| ASSERT: gnutls_handshake.c:1021
client |<2>| ASSERT: gnutls_handshake.c:2322
client |<6>| BUF[HSK]: Cleared Data from buffer
client: Handshake failed
GNUTLS ERROR: A TLS packet with unexpected length was received.
Launched, setting DH parameters...
server: ready. Listening to port '5556'.
Setting key files...
Connecting...
Self test `./openpgpself' finished with 1 errors
Launched, setting DH parameters...
server: ready. Listening to port '5556'.
server: connection from 127.0.0.1, port 48576
Self test `./openpgpself' finished with 1 errors





More information about the Gnutls-devel mailing list