gnutls 2.3.11 testsuite failure on sparc (openpgpself)
Andreas Metzler
ametzler at downhill.at.eu.org
Sun May 25 10:04:28 CEST 2008
Hello,
gnutls 2.3.11 dpoes not build correctly on sparc.
http://experimental.debian.net/fetch.php?&pkg=gnutls26&ver=2.3.11-1&arch=sparc&stamp=1211629418&file=log&as=raw
There is testsuite failure when running openpgpself. (Complete output
attached). From comparing the output with i386, it looks like i386
actually does not complete successfully, too - but the error is not
correctly reflected in the exit code:
--------------
client: Handshake failed
GNUTLS ERROR: A TLS packet with unexpected length was received.
--------------
cu andreas
--
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'
-------------- next part --------------
client |<2>| Importing Openpgp key and using openpgp sub key: 837b6fb42e0fe176
client |<2>| Importing Openpgp cert and using openpgp sub key: 837b6fb42e0fe176
client |<2>| ASSERT: pgp.c:156
client |<2>| ASSERT: privkey.c:1058
client |<2>| Importing Openpgp key and using main openpgp key.
client |<2>| ASSERT: pgp.c:1461
client |<2>| Importing Openpgp cert and using main openpgp key
client |<2>| ASSERT: pgp.c:156
client |<3>| HSK[43df0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
client |<3>| HSK[43df0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
client |<3>| HSK[43df0]: Removing ciphersuite: PSK_SHA_AES_128_CBC_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: PSK_SHA_AES_256_CBC_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: PSK_SHA_ARCFOUR_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
client |<3>| HSK[43df0]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
client |<2>| EXT[43df0]: Sending extension CERT_TYPE
client |<3>| HSK[43df0]: CLIENT HELLO was send [88 bytes]
client |<6>| BUF[HSK]: Peeked 0 bytes of Data
client |<6>| BUF[HSK]: Emptied buffer
client |<4>| REC[43df0]: Sending Packet[0] Handshake(22) with length: 88
client |<2>| ASSERT: gnutls_cipher.c:205
client |<7>| WRITE: Will write 93 bytes to 5.
client |<7>| WRITE: wrote 93 bytes to 5. Left 0 bytes. Total 93 bytes.
client |<7>| 0000 - 16 03 02 00 58 01 00 00 54 03 02 48 39 1b 27 53
client |<7>| 0001 - e2 81 a9 76 c0 17 e4 e8 b2 44 ce ef e8 24 50 74
client |<7>| 0002 - fd 2a 9c f0 5a b8 55 ea 5b 2a ac 00 00 24 00 33
client |<7>| 0003 - 00 45 00 39 00 88 00 16 00 32 00 44 00 38 00 87
client |<7>| 0004 - 00 13 00 66 00 2f 00 41 00 35 00 84 00 0a 00 05
client |<7>| 0005 - 00 04 01 00 00 07 00 09 00 03 02 00 01
client |<4>| REC[43df0]: Sent Packet[1] Handshake(22) with length: 93
server |<7>| READ: Got 5 bytes from 5
server |<7>| READ: read 5 bytes from 5
server |<7>| 0000 - 16 03 02 00 58
server |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
server |<7>| RB: Requested 5 bytes
server |<4>| REC[43618]: Expected Packet[0] Handshake(22) with length: 1
server |<4>| REC[43618]: Received Packet[0] Handshake(22) with length: 88
server |<7>| READ: Got 88 bytes from 5
server |<7>| READ: read 88 bytes from 5
server |<7>| 0000 - 01 00 00 54 03 02 48 39 1b 27 53 e2 81 a9 76 c0
server |<7>| 0001 - 17 e4 e8 b2 44 ce ef e8 24 50 74 fd 2a 9c f0 5a
server |<7>| 0002 - b8 55 ea 5b 2a ac 00 00 24 00 33 00 45 00 39 00
server |<7>| 0003 - 88 00 16 00 32 00 44 00 38 00 87 00 13 00 66 00
server |<7>| 0004 - 2f 00 41 00 35 00 84 00 0a 00 05 00 04 01 00 00
server |<7>| 0005 - 07 00 09 00 03 02 00 01
server |<7>| RB: Have 5 bytes into buffer. Adding 88 bytes.
server |<7>| RB: Requested 93 bytes
server |<2>| ASSERT: gnutls_cipher.c:205
server |<4>| REC[43618]: Decrypted Packet[0] Handshake(22) with length: 88
server |<6>| BUF[HSK]: Inserted 88 bytes of Data(22)
server |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
server |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
server |<3>| HSK[43618]: CLIENT HELLO was received [88 bytes]
server |<6>| BUF[REC][HD]: Read 84 bytes of Data(22)
server |<6>| BUF[HSK]: Peeked 0 bytes of Data
server |<6>| BUF[HSK]: Emptied buffer
server |<6>| BUF[HSK]: Inserted 4 bytes of Data
server |<6>| BUF[HSK]: Inserted 84 bytes of Data
server |<3>| HSK[43618]: Client's version: 3.2
server |<2>| ASSERT: gnutls_db.c:238
server |<2>| EXT[43618]: Received extension 'CERT_TYPE/9'
server |<2>| EXT[43618]: Received extension 'CERT_TYPE/9'
server |<2>| ASSERT: ext_cert_type.c:106
server |<2>| ASSERT: gnutls_x509.c:1077
server |<3>| HSK[43618]: Removing ciphersuite: PSK_SHA_ARCFOUR_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: PSK_SHA_AES_128_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: PSK_SHA_AES_256_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: DHE_DSS_ARCFOUR_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
server |<3>| HSK[43618]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
server |<3>| HSK[43618]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
server |<3>| HSK[43618]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
server |<3>| HSK[43618]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
server |<3>| HSK[43618]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: RSA_ARCFOUR_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: RSA_ARCFOUR_MD5
server |<3>| HSK[43618]: Removing ciphersuite: RSA_3DES_EDE_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: RSA_AES_128_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: RSA_AES_256_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
server |<3>| HSK[43618]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
server |<3>| HSK[43618]: Selected cipher suite: DHE_RSA_AES_128_CBC_SHA1
server |<3>| HSK[43618]: Selected Compression Method: NULL
server |<2>| EXT[43618]: Sending extension CERT_TYPE
server |<3>| HSK[43618]: SessionID: 757c0c3fb7b4de0754d2abddb8e73e17d8e3700ae9d1d90e1aee6bfdbb69a35a
server |<3>| HSK[43618]: SERVER HELLO was send [81 bytes]
server |<6>| BUF[HSK]: Peeked 88 bytes of Data
server |<6>| BUF[HSK]: Emptied buffer
server |<4>| REC[43618]: Sending Packet[0] Handshake(22) with length: 81
server |<2>| ASSERT: gnutls_cipher.c:205
server |<7>| WRITE: Will write 86 bytes to 5.
server |<7>| WRITE: wrote 86 bytes to 5. Left 0 bytes. Total 86 bytes.
server |<7>| 0000 - 16 03 02 00 51 02 00 00 4d 03 02 48 39 1b 27 23
server |<7>| 0001 - a7 49 e7 b3 eb 6e 54 8b 34 76 db ef bf 40 88 e3
server |<7>| 0002 - 0b 47 20 22 16 b4 f5 90 c8 11 60 20 75 7c 0c 3f
server |<7>| 0003 - b7 b4 de 07 54 d2 ab dd b8 e7 3e 17 d8 e3 70 0a
server |<7>| 0004 - e9 d1 d9 0e 1a ee 6b fd bb 69 a3 5a 00 33 00 00
server |<7>| 0005 - 05 00 09 00 01 01
server |<4>| REC[43618]: Sent Packet[1] Handshake(22) with length: 86
server |<3>| HSK[43618]: CERTIFICATE was send [1046 bytes]
server |<6>| BUF[HSK]: Peeked 0 bytes of Data
server |<6>| BUF[HSK]: Emptied buffer
server |<4>| REC[43618]: Sending Packet[1] Handshake(22) with length: 1046
server |<2>| ASSERT: gnutls_cipher.c:205
server |<7>| WRITE: Will write 1051 bytes to 5.
server |<7>| WRITE: wrote 1051 bytes to 5. Left 0 bytes. Total 1051 bytes.
server |<7>| 0000 - 16 03 02 04 16 0b 00 04 12 00 04 0f 02 08 83 7b
server |<7>| 0001 - 6f b4 2e 0f e1 76 00 04 02 99 00 d1 04 47 63 e8
server |<7>| 0002 - 83 01 06 20 d7 48 47 8b b9 3d 1e 12 c0 00 d6 c2
server |<7>| 0003 - 3f f3 b6 0b 68 8b b5 d5 6e 69 5f 6d 04 c7 a4 16
server |<7>| 0004 - 05 c5 34 82 f3 ca 48 49 23 72 57 fa e0 9e 5a ae
server |<7>| 0005 - 9d 83 fb ec 5e da 1c be 0a 51 17 8d de ff 6c 2b
server |<7>| 0006 - 0d 35 c5 21 84 7e 8c 7f 26 69 6a 51 48 3a 09 5b
server |<7>| 0007 - d3 8d d7 8b 7e 4b 95 20 19 c7 8f ed 8a 32 56 b1
server |<7>| 0008 - 7b 3a 7b 23 1b 4f 69 35 e9 5d c4 9f f2 23 ae 56
server |<7>| 0009 - ae d4 5f ba 7a b4 a6 e9 a4 a5 ce e4 68 26 7c 0f
server |<7>| 000a - 3c 55 45 6f 18 1b 35 fc f4 29 58 a4 1d 1a b8 fe
server |<7>| 000b - e8 8d d1 46 60 cd fe 19 da d6 31 94 fc dd b7 db
server |<7>| 000c - 7d 07 6f 1f 9b bb b8 3d 72 f8 a2 4a 1d 74 ae 2e
server |<7>| 000d - eb 74 38 55 27 ae ed 46 44 46 52 cc b7 5c ee 9d
server |<7>| 000e - 58 2e c4 9b 36 65 10 ef 00 11 01 00 01 b4 10 74
server |<7>| 000f - 65 73 74 33 2e 67 6e 75 74 6c 73 2e 6f 72 67 c2
server |<7>| 0010 - c0 40 04 13 01 02 00 26 05 02 47 63 e8 83 02 1b
server |<7>| 0011 - 03 05 09 09 66 01 80 06 0b 09 08 07 03 02 04 15
server |<7>| 0012 - 02 08 03 04 16 02 03 01 02 1e 01 02 17 80 00 0a
server |<7>| 0013 - 09 10 a0 21 e3 f8 08 99 90 51 f7 a4 06 1f 71 37
server |<7>| 0014 - cf 29 c4 4e e4 12 df ef a1 18 cb cc 5e ad a6 0c
server |<7>| 0015 - 97 93 d9 ef 3d eb 8c bf 89 f2 0e 06 9a f6 2b 68
server |<7>| 0016 - ac b8 b6 27 ae d1 8a cb 18 be 66 9b 72 1e fe b2
server |<7>| 0017 - 99 1d db 0e f8 a8 e7 47 23 9e 84 ff 58 ad 68 9e
server |<7>| 0018 - 8b 0e 26 fb 62 8c 60 52 f9 4f e8 a2 ad e2 9b b1
server |<7>| 0019 - 31 a5 e4 18 5d cf f3 a5 8b 17 3a 60 79 9b a0 6f
server |<7>| 001a - 76 89 94 a7 63 cc a9 dc 6c 98 e3 e8 69 19 12 63
server |<7>| 001b - 1e 51 d9 19 68 ff 3d dc b2 87 65 ea ca 77 93 8e
server |<7>| 001c - b9 63 f8 e0 ec be 20 93 10 f3 5c 93 3e 09 2d 71
server |<7>| 001d - 32 17 0e 17 48 01 86 9a 6a 2e 71 ba ef 1d 28 c3
server |<7>| 001e - ce 3b 3f 27 6c b7 39 30 d2 c3 aa 79 d9 0b 3e e4
server |<7>| 001f - 9c 68 73 67 94 05 90 ed 01 fa 99 b6 e9 a8 72 70
server |<7>| 0020 - 7a 44 ce 8d 04 47 88 a5 7c 01 04 00 d2 26 7c d5
server |<7>| 0021 - 65 f2 a4 b2 38 64 4d be 85 87 c1 0a 77 cc 55 f4
server |<7>| 0022 - 05 fe f3 e0 bc 04 b1 87 0a e2 18 36 bd 65 cd 9f
server |<7>| 0023 - fd 57 da 91 f3 62 c1 98 07 1f a8 82 7a 9a 47 06
server |<7>| 0024 - 23 f6 8e 58 e7 6e e3 ac 2f a7 f5 47 ed 05 b2 7c
server |<7>| 0025 - 93 57 01 db b8 45 3b 21 4d b2 f8 9d 3f b3 4c f7
server |<7>| 0026 - c1 cc 7d b3 1f 13 ed ba cf e7 3e 45 da 17 5a 80
server |<7>| 0027 - 1b 03 f5 81 46 0a 27 c7 0c 01 1e c3 89 a6 02 2b
server |<7>| 0028 - 18 d2 2d 90 1d 52 2e 5c 91 63 e1 13 00 11 01 00
server |<7>| 0029 - 01 c2 c0 c7 04 18 01 02 00 0f 05 02 47 88 a5 7c
server |<7>| 002a - 02 1b 02 05 09 10 ea cf 80 00 a8 09 10 a0 21 e3
server |<7>| 002b - f8 08 99 90 51 9d 20 04 19 01 02 00 06 05 02 47
server |<7>| 002c - 88 a5 7c 00 0a 09 10 83 7b 6f b4 2e 0f e1 76 00
server |<7>| 002d - 47 04 00 a0 23 84 ef 64 48 e1 3c 52 ec 04 38 a9
server |<7>| 002e - 70 b1 62 fd 2d 45 12 90 72 63 73 f7 1a d1 ab 0b
server |<7>| 002f - 01 ea f3 ac 7b 25 75 10 1c c0 26 d6 91 5c 41 04
server |<7>| 0030 - 7c 92 c3 60 8b 16 3c e9 81 d5 e1 c1 1b 6c ca d3
server |<7>| 0031 - 20 1d a6 a9 7c 03 db 8a 70 16 8c 23 c8 10 9c 76
server |<7>| 0032 - 80 36 5e 66 74 e0 8b 80 d5 6d 99 f9 13 75 33 1c
server |<7>| 0033 - 6c 8b eb d3 04 a1 7a f9 b7 eb e9 89 e9 90 15 df
server |<7>| 0034 - e7 18 3f a1 fd 0d 80 ef aa 1d 82 f0 2b c9 1b d2
server |<7>| 0035 - d5 2a 23 f1 b7 06 1e 35 1f 95 ac 97 18 e4 af 68
server |<7>| 0036 - 3f 0f d9 5e 55 cf 48 52 f3 64 19 72 a5 b1 0f ca
server |<7>| 0037 - 94 06 a6 dc 07 c6 ad a2 49 8e 21 8c 61 2b 24 66
server |<7>| 0038 - 3b 9f 13 e4 c6 be 89 ac 41 4d 42 30 79 ef a9 05
server |<7>| 0039 - 80 e0 74 7e 84 d9 d8 7d c4 b9 70 c3 36 4a 68 27
server |<7>| 003a - 08 44 24 1c 39 b9 0b b0 c5 68 7d 92 68 fa 6d 17
server |<7>| 003b - 7f cc c8 e7 b3 5e 40 5f a1 5c 98 56 ee 52 2b 5a
server |<7>| 003c - 04 15 af c2 15 a7 f9 60 a3 be 9a 70 b1 df 2f fb
server |<7>| 003d - 75 9f 43 61 83 8a f6 b2 bc f6 7e 93 f6 c3 99 5a
server |<7>| 003e - 43 4a 88 99 82 e7 66 11 85 1d 4f ab 25 4c 85 68
server |<7>| 003f - 77 e1 0f cf ec bc dd 8b b9 99 0e e7 bd 29 8d 5f
server |<7>| 0040 - ca eb c1 1a 1e 71 1f 93 96 fc 8d 6b bf 7a ea 21
server |<7>| 0041 - c1 c0 b0 7f 6d 0c d6 44 e8 dc 18
server |<4>| REC[43618]: Sent Packet[2] Handshake(22) with length: 1051
client |<7>| READ: Got 5 bytes from 5
client |<7>| READ: read 5 bytes from 5
client |<7>| 0000 - 16 03 02 00 51
client |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
client |<7>| RB: Requested 5 bytes
client |<4>| REC[43df0]: Expected Packet[0] Handshake(22) with length: 1
client |<4>| REC[43df0]: Received Packet[0] Handshake(22) with length: 81
client |<7>| READ: Got 81 bytes from 5
client |<7>| READ: read 81 bytes from 5
client |<7>| 0000 - 02 00 00 4d 03 02 48 39 1b 27 23 a7 49 e7 b3 eb
client |<7>| 0001 - 6e 54 8b 34 76 db ef bf 40 88 e3 0b 47 20 22 16
client |<7>| 0002 - b4 f5 90 c8 11 60 20 75 7c 0c 3f b7 b4 de 07 54
client |<7>| 0003 - d2 ab dd b8 e7 3e 17 d8 e3 70 0a e9 d1 d9 0e 1a
client |<7>| 0004 - ee 6b fd bb 69 a3 5a 00 33 00 00 05 00 09 00 01
client |<7>| 0005 - 01
client |<7>| RB: Have 5 bytes into buffer. Adding 81 bytes.
client |<7>| RB: Requested 86 bytes
client |<2>| ASSERT: gnutls_cipher.c:205
client |<4>| REC[43df0]: Decrypted Packet[0] Handshake(22) with length: 81
client |<6>| BUF[HSK]: Inserted 81 bytes of Data(22)
client |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
client |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
client |<3>| HSK[43df0]: SERVER HELLO was received [81 bytes]
client |<6>| BUF[REC][HD]: Read 77 bytes of Data(22)
client |<6>| BUF[HSK]: Peeked 0 bytes of Data
client |<6>| BUF[HSK]: Emptied buffer
client |<6>| BUF[HSK]: Inserted 4 bytes of Data
client |<6>| BUF[HSK]: Inserted 77 bytes of Data
client |<3>| HSK[43df0]: Server's version: 3.2
client |<3>| HSK[43df0]: SessionID length: 32
client |<3>| HSK[43df0]: SessionID: 757c0c3fb7b4de0754d2abddb8e73e17d8e3700ae9d1d90e1aee6bfdbb69a35a
client |<3>| HSK[43df0]: Selected cipher suite: DHE_RSA_AES_128_CBC_SHA1
client |<2>| EXT[43df0]: Received extension 'CERT_TYPE/9'
client |<7>| READ: Got 5 bytes from 5
client |<7>| READ: read 5 bytes from 5
client |<7>| 0000 - 16 03 02 04 16
client |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
client |<7>| RB: Requested 5 bytes
client |<4>| REC[43df0]: Expected Packet[1] Handshake(22) with length: 1
client |<4>| REC[43df0]: Received Packet[1] Handshake(22) with length: 1046
client |<7>| READ: Got 1046 bytes from 5
client |<7>| READ: read 1046 bytes from 5
client |<7>| 0000 - 0b 00 04 12 00 04 0f 02 08 83 7b 6f b4 2e 0f e1
client |<7>| 0001 - 76 00 04 02 99 00 d1 04 47 63 e8 83 01 06 20 d7
client |<7>| 0002 - 48 47 8b b9 3d 1e 12 c0 00 d6 c2 3f f3 b6 0b 68
client |<7>| 0003 - 8b b5 d5 6e 69 5f 6d 04 c7 a4 16 05 c5 34 82 f3
client |<7>| 0004 - ca 48 49 23 72 57 fa e0 9e 5a ae 9d 83 fb ec 5e
client |<7>| 0005 - da 1c be 0a 51 17 8d de ff 6c 2b 0d 35 c5 21 84
client |<7>| 0006 - 7e 8c 7f 26 69 6a 51 48 3a 09 5b d3 8d d7 8b 7e
client |<7>| 0007 - 4b 95 20 19 c7 8f ed 8a 32 56 b1 7b 3a 7b 23 1b
client |<7>| 0008 - 4f 69 35 e9 5d c4 9f f2 23 ae 56 ae d4 5f ba 7a
client |<7>| 0009 - b4 a6 e9 a4 a5 ce e4 68 26 7c 0f 3c 55 45 6f 18
client |<7>| 000a - 1b 35 fc f4 29 58 a4 1d 1a b8 fe e8 8d d1 46 60
client |<7>| 000b - cd fe 19 da d6 31 94 fc dd b7 db 7d 07 6f 1f 9b
client |<7>| 000c - bb b8 3d 72 f8 a2 4a 1d 74 ae 2e eb 74 38 55 27
client |<7>| 000d - ae ed 46 44 46 52 cc b7 5c ee 9d 58 2e c4 9b 36
client |<7>| 000e - 65 10 ef 00 11 01 00 01 b4 10 74 65 73 74 33 2e
client |<7>| 000f - 67 6e 75 74 6c 73 2e 6f 72 67 c2 c0 40 04 13 01
client |<7>| 0010 - 02 00 26 05 02 47 63 e8 83 02 1b 03 05 09 09 66
client |<7>| 0011 - 01 80 06 0b 09 08 07 03 02 04 15 02 08 03 04 16
client |<7>| 0012 - 02 03 01 02 1e 01 02 17 80 00 0a 09 10 a0 21 e3
client |<7>| 0013 - f8 08 99 90 51 f7 a4 06 1f 71 37 cf 29 c4 4e e4
client |<7>| 0014 - 12 df ef a1 18 cb cc 5e ad a6 0c 97 93 d9 ef 3d
client |<7>| 0015 - eb 8c bf 89 f2 0e 06 9a f6 2b 68 ac b8 b6 27 ae
client |<7>| 0016 - d1 8a cb 18 be 66 9b 72 1e fe b2 99 1d db 0e f8
client |<7>| 0017 - a8 e7 47 23 9e 84 ff 58 ad 68 9e 8b 0e 26 fb 62
client |<7>| 0018 - 8c 60 52 f9 4f e8 a2 ad e2 9b b1 31 a5 e4 18 5d
client |<7>| 0019 - cf f3 a5 8b 17 3a 60 79 9b a0 6f 76 89 94 a7 63
client |<7>| 001a - cc a9 dc 6c 98 e3 e8 69 19 12 63 1e 51 d9 19 68
client |<7>| 001b - ff 3d dc b2 87 65 ea ca 77 93 8e b9 63 f8 e0 ec
client |<7>| 001c - be 20 93 10 f3 5c 93 3e 09 2d 71 32 17 0e 17 48
client |<7>| 001d - 01 86 9a 6a 2e 71 ba ef 1d 28 c3 ce 3b 3f 27 6c
client |<7>| 001e - b7 39 30 d2 c3 aa 79 d9 0b 3e e4 9c 68 73 67 94
client |<7>| 001f - 05 90 ed 01 fa 99 b6 e9 a8 72 70 7a 44 ce 8d 04
client |<7>| 0020 - 47 88 a5 7c 01 04 00 d2 26 7c d5 65 f2 a4 b2 38
client |<7>| 0021 - 64 4d be 85 87 c1 0a 77 cc 55 f4 05 fe f3 e0 bc
client |<7>| 0022 - 04 b1 87 0a e2 18 36 bd 65 cd 9f fd 57 da 91 f3
client |<7>| 0023 - 62 c1 98 07 1f a8 82 7a 9a 47 06 23 f6 8e 58 e7
client |<7>| 0024 - 6e e3 ac 2f a7 f5 47 ed 05 b2 7c 93 57 01 db b8
client |<7>| 0025 - 45 3b 21 4d b2 f8 9d 3f b3 4c f7 c1 cc 7d b3 1f
client |<7>| 0026 - 13 ed ba cf e7 3e 45 da 17 5a 80 1b 03 f5 81 46
client |<7>| 0027 - 0a 27 c7 0c 01 1e c3 89 a6 02 2b 18 d2 2d 90 1d
client |<7>| 0028 - 52 2e 5c 91 63 e1 13 00 11 01 00 01 c2 c0 c7 04
client |<7>| 0029 - 18 01 02 00 0f 05 02 47 88 a5 7c 02 1b 02 05 09
client |<7>| 002a - 10 ea cf 80 00 a8 09 10 a0 21 e3 f8 08 99 90 51
client |<7>| 002b - 9d 20 04 19 01 02 00 06 05 02 47 88 a5 7c 00 0a
client |<7>| 002c - 09 10 83 7b 6f b4 2e 0f e1 76 00 47 04 00 a0 23
client |<7>| 002d - 84 ef 64 48 e1 3c 52 ec 04 38 a9 70 b1 62 fd 2d
client |<7>| 002e - 45 12 90 72 63 73 f7 1a d1 ab 0b 01 ea f3 ac 7b
client |<7>| 002f - 25 75 10 1c c0 26 d6 91 5c 41 04 7c 92 c3 60 8b
client |<7>| 0030 - 16 3c e9 81 d5 e1 c1 1b 6c ca d3 20 1d a6 a9 7c
client |<7>| 0031 - 03 db 8a 70 16 8c 23 c8 10 9c 76 80 36 5e 66 74
client |<7>| 0032 - e0 8b 80 d5 6d 99 f9 13 75 33 1c 6c 8b eb d3 04
client |<7>| 0033 - a1 7a f9 b7 eb e9 89 e9 90 15 df e7 18 3f a1 fd
client |<7>| 0034 - 0d 80 ef aa 1d 82 f0 2b c9 1b d2 d5 2a 23 f1 b7
client |<7>| 0035 - 06 1e 35 1f 95 ac 97 18 e4 af 68 3f 0f d9 5e 55
client |<7>| 0036 - cf 48 52 f3 64 19 72 a5 b1 0f ca 94 06 a6 dc 07
client |<7>| 0037 - c6 ad a2 49 8e 21 8c 61 2b 24 66 3b 9f 13 e4 c6
client |<7>| 0038 - be 89 ac 41 4d 42 30 79 ef a9 05 80 e0 74 7e 84
client |<7>| 0039 - d9 d8 7d c4 b9 70 c3 36 4a 68 27 08 44 24 1c 39
client |<7>| 003a - b9 0b b0 c5 68 7d 92 68 fa 6d 17 7f cc c8 e7 b3
client |<7>| 003b - 5e 40 5f a1 5c 98 56 ee 52 2b 5a 04 15 af c2 15
client |<7>| 003c - a7 f9 60 a3 be 9a 70 b1 df 2f fb 75 9f 43 61 83
client |<7>| 003d - 8a f6 b2 bc f6 7e 93 f6 c3 99 5a 43 4a 88 99 82
client |<7>| 003e - e7 66 11 85 1d 4f ab 25 4c 85 68 77 e1 0f cf ec
client |<7>| 003f - bc dd 8b b9 99 0e e7 bd 29 8d 5f ca eb c1 1a 1e
client |<7>| 0040 - 71 1f 93 96 fc 8d 6b bf 7a ea 21 c1 c0 b0 7f 6d
client |<7>| 0041 - 0c d6 44 e8 dc 18
client |<7>| RB: Have 5 bytes into buffer. Adding 1046 bytes.
client |<7>| RB: Requested 1051 bytes
client |<2>| ASSERT: gnutls_cipher.c:205
client |<4>| REC[43df0]: Decrypted Packet[1] Handshake(22) with length: 1046
client |<6>| BUF[HSK]: Inserted 1046 bytes of Data(22)
client |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
client |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
client |<3>| HSK[43df0]: CERTIFICATE was received [1046 bytes]
client |<6>| BUF[REC][HD]: Read 1042 bytes of Data(22)
client |<6>| BUF[HSK]: Peeked 81 bytes of Data
client |<6>| BUF[HSK]: Emptied buffer
client |<6>| BUF[HSK]: Inserted 4 bytes of Data
client |<6>| BUF[HSK]: Inserted 1042 bytes of Data
client |<2>| Importing Openpgp cert and using openpgp sub key: 837b6fb400000402
client |<2>| ASSERT: pgp.c:763
client |<2>| ASSERT: pgp.c:969
client |<2>| ASSERT: gnutls_openpgp.c:795
client |<2>| ASSERT: auth_cert.c:1197
client |<2>| ASSERT: gnutls_kx.c:717
client |<2>| ASSERT: gnutls_handshake.c:2345
client |<6>| BUF[HSK]: Cleared Data from buffer
client: Handshake failed
GNUTLS ERROR: Could not find OpenPGP subkey.
Launched, setting DH parameters...
server: ready. Listening to port '5556'.
Setting key files...
Connecting...
server |<3>| HSK[43618]: SERVER KEY EXCHANGE was send [397 bytes]
server |<6>| BUF[HSK]: Peeked 0 bytes of Data
server |<6>| BUF[HSK]: Emptied buffer
server |<4>| REC[43618]: Sending Packet[2] Handshake(22) with length: 397
server |<2>| ASSERT: gnutls_cipher.c:205
server |<7>| WRITE: Will write 402 bytes to 5.
server |<7>| WRITE: wrote 402 bytes to 5. Left 0 bytes. Total 402 bytes.
server |<7>| 0000 - 16 03 02 01 8d 0c 00 01 89 00 80 b6 4c 70 da 39
server |<7>| 0001 - 6c 54 2b 2b 7c ba b1 ac df 88 ac 5f f7 5b cb d5
server |<7>| 0002 - 16 f0 f3 61 b2 e6 c6 2d 86 42 ff 6c fc f4 06 58
server |<7>| 0003 - fd 5d f6 2d b6 3f 60 e9 ad f7 09 92 75 ad ec a8
server |<7>| 0004 - 42 23 54 9a 62 c7 8e 40 82 08 01 83 fb f0 27 f2
server |<7>| 0005 - 22 91 92 71 6f ef 4b c9 21 af 0d 2b 95 08 b2 78
server |<7>| 0006 - 2b d0 80 5d ce 19 e1 8e 13 2c 1c c3 ea 10 4f 84
server |<7>| 0007 - a6 14 e0 fb 1f 4b 26 25 ed 82 37 28 d8 a5 ec 41
server |<7>| 0008 - 5d 0f c0 d2 66 d3 17 d4 0a 9b 57 00 01 05 00 80
server |<7>| 0009 - 70 aa 22 40 b8 13 0c 5f 6e 24 d5 99 65 3d d5 68
server |<7>| 000a - 6e f4 24 be dd 9e c6 12 1e 4a d5 db d4 09 67 20
server |<7>| 000b - c6 16 bf 0b 6b fe 60 90 98 18 d8 f1 ae ca 2e 66
server |<7>| 000c - 04 dc bb bc cd 3d 58 e3 e4 97 35 7a 95 15 c8 85
server |<7>| 000d - 39 73 12 7e 7b 27 4f 12 b5 d2 1e 09 7c ff 5f cb
server |<7>| 000e - 75 5e 83 63 67 89 91 a7 74 8f 3a af d7 c6 2e 00
server |<7>| 000f - df d6 fe 9c 01 44 e5 a9 99 79 5e e6 11 d7 68 7e
server |<7>| 0010 - 6c 72 3a d1 02 da 93 c8 60 b4 09 f1 e7 0b ea 91
server |<7>| 0011 - 00 80 64 9c 8d 7b 76 51 bf 85 fc 90 00 c5 19 aa
server |<7>| 0012 - cd 01 c8 d6 f2 5b cf 17 c5 a9 dc 19 e0 4a a7 b2
server |<7>| 0013 - 3b d5 f3 d9 01 1b 1d 89 7c e0 98 87 af 8b da 41
server |<7>| 0014 - 44 77 b7 20 6d 29 62 ba 3f 9d 78 c2 5f e4 7b 58
server |<7>| 0015 - 0d ec 15 ad 76 85 3c 25 32 da 5d de 35 af 58 2e
server |<7>| 0016 - ef 55 fa 6a 21 9d 51 4f be c1 8a ce 3c 17 ac 03
server |<7>| 0017 - e3 60 30 be 61 52 7f c8 4d 9d 65 59 c8 85 78 21
server |<7>| 0018 - 53 05 ed 98 d9 3e eb 65 f4 d6 a3 cd e6 cb ef ce
server |<7>| 0019 - 69 2b
server |<4>| REC[43618]: Sent Packet[3] Handshake(22) with length: 402
server |<3>| HSK[43618]: CERTIFICATE REQUEST was send [9 bytes]
server |<6>| BUF[HSK]: Peeked 0 bytes of Data
server |<6>| BUF[HSK]: Emptied buffer
server |<4>| REC[43618]: Sending Packet[3] Handshake(22) with length: 9
server |<2>| ASSERT: gnutls_cipher.c:205
server |<7>| WRITE: Will write 14 bytes to 5.
real 0m0.291s
user 0m0.248s
sys 0m0.016s
openpgpself exitcode was 141
-------------- next part --------------
Self test `./resume' finished with 0 errors
PASS: resume
client |<2>| Importing Openpgp key and using openpgp sub key: 837b6fb470ad0608
client |<2>| ASSERT: pgp.c:763
client |<2>| ASSERT: privkey.c:505
client |<2>| ASSERT: gnutls_openpgp.c:739
client |<2>| ASSERT: gnutls_openpgp.c:152
client |<2>| ASSERT: privkey.c:1058
client |<2>| Importing Openpgp key and using main openpgp key.
client |<2>| ASSERT: pgp.c:1461
client |<2>| Importing Openpgp cert and using main openpgp key
client |<2>| ASSERT: pgp.c:156
client |<3>| HSK[806afc8]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
client |<3>| HSK[806afc8]: Keeping ciphersuite: RSA_ARCFOUR_MD5
client |<3>| HSK[806afc8]: Removing ciphersuite: PSK_SHA_AES_128_CBC_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: PSK_SHA_AES_256_CBC_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: PSK_SHA_ARCFOUR_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
client |<3>| HSK[806afc8]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
client |<2>| EXT[806afc8]: Sending extension CERT_TYPE
client |<3>| HSK[806afc8]: CLIENT HELLO was send [88 bytes]
client |<6>| BUF[HSK]: Peeked 0 bytes of Data
client |<6>| BUF[HSK]: Emptied buffer
client |<4>| REC[806afc8]: Sending Packet[0] Handshake(22) with length: 88
client |<2>| ASSERT: gnutls_cipher.c:205
client |<7>| WRITE: Will write 93 bytes to 5.
client |<7>| WRITE: wrote 93 bytes to 5. Left 0 bytes. Total 93 bytes.
client |<7>| 0000 - 16 03 02 00 58 01 00 00 54 03 02 48 37 c1 ee 06
client |<7>| 0001 - 5a c3 18 95 9e d6 e4 f4 ef 57 8d 03 e0 80 15 fa
client |<7>| 0002 - eb 2a 0a 27 bc 58 9e 41 dc 90 db 00 00 24 00 33
client |<7>| 0003 - 00 45 00 39 00 88 00 16 00 32 00 44 00 38 00 87
client |<7>| 0004 - 00 13 00 66 00 2f 00 41 00 35 00 84 00 0a 00 05
client |<7>| 0005 - 00 04 01 00 00 07 00 09 00 03 02 00 01
client |<4>| REC[806afc8]: Sent Packet[1] Handshake(22) with length: 93
server |<7>| READ: Got 5 bytes from 5
server |<7>| READ: read 5 bytes from 5
server |<7>| 0000 - 16 03 02 00 58
server |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
server |<7>| RB: Requested 5 bytes
server |<4>| REC[806ad98]: Expected Packet[0] Handshake(22) with length: 1
server |<4>| REC[806ad98]: Received Packet[0] Handshake(22) with length: 88
server |<7>| READ: Got 88 bytes from 5
server |<7>| READ: read 88 bytes from 5
server |<7>| 0000 - 01 00 00 54 03 02 48 37 c1 ee 06 5a c3 18 95 9e
server |<7>| 0001 - d6 e4 f4 ef 57 8d 03 e0 80 15 fa eb 2a 0a 27 bc
server |<7>| 0002 - 58 9e 41 dc 90 db 00 00 24 00 33 00 45 00 39 00
server |<7>| 0003 - 88 00 16 00 32 00 44 00 38 00 87 00 13 00 66 00
server |<7>| 0004 - 2f 00 41 00 35 00 84 00 0a 00 05 00 04 01 00 00
server |<7>| 0005 - 07 00 09 00 03 02 00 01
server |<7>| RB: Have 5 bytes into buffer. Adding 88 bytes.
server |<7>| RB: Requested 93 bytes
server |<2>| ASSERT: gnutls_cipher.c:205
server |<4>| REC[806ad98]: Decrypted Packet[0] Handshake(22) with length: 88
server |<6>| BUF[HSK]: Inserted 88 bytes of Data(22)
server |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
server |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
server |<3>| HSK[806ad98]: CLIENT HELLO was received [88 bytes]
server |<6>| BUF[REC][HD]: Read 84 bytes of Data(22)
server |<6>| BUF[HSK]: Peeked 0 bytes of Data
server |<6>| BUF[HSK]: Emptied buffer
server |<6>| BUF[HSK]: Inserted 4 bytes of Data
server |<6>| BUF[HSK]: Inserted 84 bytes of Data
server |<3>| HSK[806ad98]: Client's version: 3.2
server |<2>| ASSERT: gnutls_db.c:238
server |<2>| EXT[806ad98]: Received extension 'CERT_TYPE/9'
server |<2>| EXT[806ad98]: Received extension 'CERT_TYPE/9'
server |<2>| ASSERT: ext_cert_type.c:106
server |<2>| ASSERT: ext_cert_type.c:106
server |<2>| ASSERT: ext_cert_type.c:123
server |<2>| ASSERT: gnutls_handshake.c:2875
server |<1>| Could not find an appropriate certificate: Insufficient credentials for that request.
server |<3>| HSK[806ad98]: Removing ciphersuite: PSK_SHA_ARCFOUR_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: PSK_SHA_AES_128_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: PSK_SHA_AES_256_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: DHE_DSS_ARCFOUR_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: RSA_ARCFOUR_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: RSA_ARCFOUR_MD5
server |<3>| HSK[806ad98]: Removing ciphersuite: RSA_3DES_EDE_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: RSA_AES_128_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: RSA_AES_256_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
server |<3>| HSK[806ad98]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
server |<2>| ASSERT: gnutls_handshake.c:706
server |<2>| ASSERT: gnutls_handshake.c:465
server |<2>| ASSERT: gnutls_handshake.c:2024
server |<2>| ASSERT: gnutls_handshake.c:2550
server |<6>| BUF[HSK]: Cleared Data from buffer
client |<7>| READ: Got 0 bytes from 5
client |<7>| READ: read 0 bytes from 5
client |<7>| 0000 -
client |<2>| ASSERT: gnutls_buffers.c:638
client |<2>| ASSERT: gnutls_record.c:909
client |<2>| ASSERT: gnutls_buffers.c:1152
client |<2>| ASSERT: gnutls_handshake.c:1031
client |<2>| ASSERT: gnutls_handshake.c:2330
client |<6>| BUF[HSK]: Cleared Data from buffer
client: Handshake failed
GNUTLS ERROR: A TLS packet with unexpected length was received.
Launched, setting DH parameters...
server: ready. Listening to port '5556'.
Setting key files...
Connecting...
server: Handshake has failed (Could not negotiate a supported cipher suite.)
Launched, setting DH parameters...
server: ready. Listening to port '5556'.
server: connection from 127.0.0.1, port 55245
PASS: openpgpself
More information about the Gnutls-devel
mailing list