From nmav at gnutls.org Tue Jun 5 19:36:42 2012 From: nmav at gnutls.org (Nikos Mavrogiannopoulos) Date: Tue, 05 Jun 2012 19:36:42 +0200 Subject: gnutls 3.0.20 Message-ID: <4FCE43AA.60806@gnutls.org> Hello, I've just released gnutls 3.0.20. This is a minor feature update and bug-fix release on the current stable branch. * Version 3.0.20 (released 2012-06-05) ** libgnutls: Corrected bug which prevented the parsing of handshake packets spanning multiple records. ** libgnutls: Check key identifiers when checking for an issuer. ** libgnutls: Added gnutls_pubkey_verify_hash2() ** libgnutls: Added gnutls_certificate_set_x509_system_trust() that loads the trusted CA certificates from system locations (e.g. trusted storage in windows and CA bundle files in other systems). ** certtool: Added support for the URI subject alternative name type in certtool. ** certtool: Increase to 128 the maximum number of distinct options (e.g. dns_names) allowed. ** gnutls-cli: If --print-cert is given, print the certificate, even on verification failure. ** API and ABI modifications: gnutls_pk_to_sign: Added gnutls_pubkey_verify_hash2: Added gnutls_certificate_set_x509_system_trust: Added Getting the Software ==================== GnuTLS may be downloaded from one of the GNU mirror sites or directly >From . The list of GNU mirrors can be found at and a list of GnuTLS mirrors can be found at . Here are the XZ compressed sources: ftp://ftp.gnu.org/gnu/gnutls/gnutls-3.0.20.tar.xz http://ftp.gnu.org/gnu/gnutls/gnutls-3.0.20.tar.xz ftp://ftp.gnutls.org/pub/gnutls/gnutls-3.0.20.tar.xz Here are the LZIP compressed sources: ftp://ftp.gnu.org/gnu/gnutls/gnutls-3.0.20.tar.lz http://ftp.gnu.org/gnu/gnutls/gnutls-3.0.20.tar.lz ftp://ftp.gnutls.org/pub/gnutls/gnutls-3.0.20.tar.lz Here are OpenPGP detached signatures signed using key 0x96865171: ftp://ftp.gnu.org/gnu/gnutls/gnutls-3.0.20.tar.xz.sig http://ftp.gnu.org/gnu/gnutls/gnutls-3.0.20.tar.xz.sig ftp://ftp.gnutls.org/pub/gnutls/gnutls-3.0.20.tar.xz.sig ftp://ftp.gnu.org/gnu/gnutls/gnutls-3.0.20.tar.lz.sig http://ftp.gnu.org/gnu/gnutls/gnutls-3.0.20.tar.lz.sig ftp://ftp.gnutls.org/pub/gnutls/gnutls-3.0.20.tar.lz.sig Note that it has been signed with my openpgp key: pub 3104R/96865171 2008-05-04 [expires: 2028-04-29] uid Nikos Mavrogiannopoulos gnutls.org> uid Nikos Mavrogiannopoulos gmail.com> sub 2048R/9013B842 2008-05-04 [expires: 2018-05-02] sub 2048R/1404A91D 2008-05-04 [expires: 2018-05-02] regards, Nikos From mabrand at mabrand.nl Wed Jun 6 10:16:17 2012 From: mabrand at mabrand.nl (Mark Brand) Date: Wed, 06 Jun 2012 10:16:17 +0200 Subject: [PATCH] add missing include wincrypt.h Message-ID: <4FCF11D1.2000905@mabrand.nl> From ca841dcb3e6144b31de5e7515e48351ebd154a0a Mon Sep 17 00:00:00 2001 From: Mark Brand Date: Wed, 6 Jun 2012 10:09:48 +0200 Subject: [PATCH] add missing include wincrypt.h --- lib/gnutls_x509.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/lib/gnutls_x509.c b/lib/gnutls_x509.c index 71e0d69..130d75c 100644 --- a/lib/gnutls_x509.c +++ b/lib/gnutls_x509.c @@ -42,6 +42,9 @@ #include "x509/x509_int.h" #include #include "read-file.h" +#if defined _WIN32 || defined __WIN32__ +#include +#endif /* * some x509 certificate parsing functions. -- 1.7.9.2 -------------- next part -------------- A non-text attachment was scrubbed... Name: 0001-add-missing-include-wincrypt.h.patch Type: text/x-patch Size: 630 bytes Desc: not available URL: From nmav at gnutls.org Wed Jun 6 10:42:01 2012 From: nmav at gnutls.org (Nikos Mavrogiannopoulos) Date: Wed, 6 Jun 2012 10:42:01 +0200 Subject: [PATCH] add missing include wincrypt.h In-Reply-To: <4FCF11D1.2000905@mabrand.nl> References: <4FCF11D1.2000905@mabrand.nl> Message-ID: Thanks. Btw why do you check for _WIN32 or __WIN32__? Are there cases where one may exist and the other not? regards, Nikos On Wed, Jun 6, 2012 at 10:16 AM, Mark Brand wrote: > From ca841dcb3e6144b31de5e7515e48351ebd154a0a Mon Sep 17 00:00:00 2001 > From: Mark Brand > Date: Wed, 6 Jun 2012 10:09:48 +0200 > Subject: [PATCH] add missing include wincrypt.h > > --- > ?lib/gnutls_x509.c | ? ?3 +++ > ?1 file changed, 3 insertions(+) > > diff --git a/lib/gnutls_x509.c b/lib/gnutls_x509.c > index 71e0d69..130d75c 100644 > --- a/lib/gnutls_x509.c > +++ b/lib/gnutls_x509.c > @@ -42,6 +42,9 @@ > ?#include "x509/x509_int.h" > ?#include > ?#include "read-file.h" > +#if defined _WIN32 || defined __WIN32__ > +#include > +#endif > > ?/* > ?* some x509 certificate parsing functions. > -- > 1.7.9.2 > > _______________________________________________ > Gnutls-devel mailing list > Gnutls-devel at gnu.org > https://lists.gnu.org/mailman/listinfo/gnutls-devel > From mabrand at mabrand.nl Wed Jun 6 10:59:51 2012 From: mabrand at mabrand.nl (Mark Brand) Date: Wed, 06 Jun 2012 10:59:51 +0200 Subject: [PATCH] add missing include wincrypt.h In-Reply-To: References: <4FCF11D1.2000905@mabrand.nl> Message-ID: <4FCF1C07.7020005@mabrand.nl> Nikos Mavrogiannopoulos wrote: > Thanks. Btw why do you check for _WIN32 or __WIN32__? Are there cases > where one may exist and the other not? > > regards, > Nikos I was just trying to follow the precedent that seems widespread in the gnutls sources. I wondered about the necessity of this myself. Mark From eliz at gnu.org Wed Jun 6 17:16:04 2012 From: eliz at gnu.org (Eli Zaretskii) Date: Wed, 06 Jun 2012 18:16:04 +0300 Subject: [PATCH] add missing include wincrypt.h In-Reply-To: References: <4FCF11D1.2000905@mabrand.nl> Message-ID: <83hauowjwr.fsf@gnu.org> > Date: Wed, 6 Jun 2012 10:42:01 +0200 > From: Nikos Mavrogiannopoulos > Cc: GnuTLS development list > > Thanks. Btw why do you check for _WIN32 or __WIN32__? Also, shouldn't that exclude Cygwin? From Scott.Michel at aero.org Thu Jun 7 20:35:18 2012 From: Scott.Michel at aero.org (Scott Michel) Date: Thu, 7 Jun 2012 11:35:18 -0700 Subject: [PATCH] add missing include wincrypt.h In-Reply-To: <83hauowjwr.fsf@gnu.org> References: <4FCF11D1.2000905@mabrand.nl> <83hauowjwr.fsf@gnu.org> Message-ID: Also might want to check for __WIN64__ as well, since that's becoming more prevalent. I'd also suggest "defined(...)" around the macro names. GCC is notorious for complaining when macros aren't defined but whose values are tested. On Jun 6, 2012, at 8:16 AM, Eli Zaretskii wrote: >> Date: Wed, 6 Jun 2012 10:42:01 +0200 >> From: Nikos Mavrogiannopoulos >> Cc: GnuTLS development list >> >> Thanks. Btw why do you check for _WIN32 or __WIN32__? > > Also, shouldn't that exclude Cygwin? > > _______________________________________________ > Gnutls-devel mailing list > Gnutls-devel at gnu.org > https://lists.gnu.org/mailman/listinfo/gnutls-devel > From eliz at gnu.org Fri Jun 8 07:54:46 2012 From: eliz at gnu.org (Eli Zaretskii) Date: Fri, 08 Jun 2012 08:54:46 +0300 Subject: [PATCH] add missing include wincrypt.h In-Reply-To: References: <4FCF11D1.2000905@mabrand.nl> <83hauowjwr.fsf@gnu.org> Message-ID: <83r4tquz4p.fsf@gnu.org> > From: Scott Michel > Date: Thu, 7 Jun 2012 11:35:18 -0700 > Cc: Nikos Mavrogiannopoulos , > gnutls-devel at gnu.org > > Also might want to check for __WIN64__ as well, since that's becoming more prevalent. I think every compiler that defines __WIN64__ also defines _WIN32. > I'd also suggest "defined(...)" around the macro names. GCC is notorious for complaining when macros aren't defined but whose values are tested. ??? Are you sure you are talking about GCC and not some other compiler? Can you give an example of such notorious complaints? FWIW, I've never seen any. From nmav at gnutls.org Sun Jun 10 13:07:17 2012 From: nmav at gnutls.org (Nikos Mavrogiannopoulos) Date: Sun, 10 Jun 2012 13:07:17 +0200 Subject: gnutls 2.12.20 Message-ID: <4FD47FE5.6030806@gnutls.org> Hello, I've just released gnutls 2.12.19. It includes few bug fixes. Version 2.12.20 (released 2012-06-10) ** libgnutls: Fixed memory leak in PKCS #8 key import. ** libgnutls: Check key identifiers when checking for an issuer. ** API and ABI modifications: No changes since last version. Getting the Software ==================== GnuTLS may be downloaded from one of the GNU mirror sites or directly >From and a list of GnuTLS mirrors can be found at . Here are the BZIP2 compressed sources: ftp://ftp.gnu.org/gnu/gnutls/gnutls-2.12.20.tar.bz2 http://ftp.gnu.org/gnu/gnutls/gnutls-2.12.20.tar.bz2 Here are OpenPGP detached signatures signed using key 0x96865171: ftp://ftp.gnu.org/gnu/gnutls/gnutls-2.12.20.tar.bz2.sig http://ftp.gnu.org/gnu/gnutls/gnutls-2.12.20.tar.bz2.sig Note that it has been signed with my openpgp key: pub 3104R/96865171 2008-05-04 [expires: 2028-04-29] uid Nikos Mavrogiannopoulos gnutls.org> uid Nikos Mavrogiannopoulos gmail.com> sub 2048R/9013B842 2008-05-04 [expires: 2018-05-02] sub 2048R/1404A91D 2008-05-04 [expires: 2018-05-02] regards, Nikos From flameeyes at flameeyes.eu Fri Jun 15 21:19:12 2012 From: flameeyes at flameeyes.eu (=?UTF-8?q?Diego=20Elio=20Petten=C3=B2?=) Date: Fri, 15 Jun 2012 12:19:12 -0700 Subject: [PATCH] build: make sure to declare the generated source files as BUILT_SOURCES Message-ID: <1339787952-740687-1-git-send-email-flameeyes@flameeyes.eu> This allows proper building when using parallel make on a multi-core system. Signed-off-by: Diego Elio Petten? --- src/Makefile.am | 3 +++ 1 files changed, 3 insertions(+), 0 deletions(-) diff --git a/src/Makefile.am b/src/Makefile.am index 5550f3b..8b3b578 100644 --- a/src/Makefile.am +++ b/src/Makefile.am @@ -150,6 +150,9 @@ libcmd_p11tool_la_LIBADD += ../gl/libgnu.la $(INET_PTON_LIB) endif # ENABLE_PKCS11 +BUILT_SOURCES = ocsptool-args.c p11tool-args.c psk-args.c cli-debug-args.c \ + cli-args.c serv-args.c srptool-args.c certtool-args.c + ocsptool-args.c: $(srcdir)/args-std.def $(srcdir)/ocsptool-args.def -autogen ocsptool-args.def p11tool-args.c: $(srcdir)/args-std.def $(srcdir)/p11tool-args.def -- 1.7.8.6 From ametzler at downhill.at.eu.org Sun Jun 17 11:57:32 2012 From: ametzler at downhill.at.eu.org (Andreas Metzler) Date: Sun, 17 Jun 2012 11:57:32 +0200 Subject: dtls-stress on s390x Message-ID: <20120617095732.GA2589@downhill.g.la> Hello, the dtls test of 3.0.20 (and .19, now too) fails on S390x. Any idea what's wrong? Find attached a log of ./dtls-stress -d 4712 -shello 021 -sfinished 01 -cfinished 012 SKeyExchange CKeyExchange CFinished cu andreas -- `What a good friend you are to him, Dr. Maturin. His other friends are so grateful to you.' `I sew his ears on from time to time, sure' -------------- next part -------------- 3030 server|<4> REC[0x80024de0]: Allocating epoch #0 3030 server|<2> ASSERT: gnutls_constate.c:717 3030 server|<4> REC[0x80024de0]: Allocating epoch #1 3030 client|<4> REC[0x80024de0]: Allocating epoch #0 3030 client|<2> ASSERT: gnutls_constate.c:717 3030 client|<4> REC[0x80024de0]: Allocating epoch #1 3030 client|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 3030 client|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 3030 client|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 3030 client|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 3030 client|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 3030 client|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 3030 client|<3> HSK[0x80024de0]: Keeping ciphersuite: ECDH_ANON_AES_128_CBC_SHA1 (C0.18) 3030 client|<3> HSK[0x80024de0]: Keeping ciphersuite: ECDH_ANON_AES_256_CBC_SHA1 (C0.19) 3030 client|<3> HSK[0x80024de0]: Keeping ciphersuite: ECDH_ANON_3DES_EDE_CBC_SHA1 (C0.17) 3030 client|<3> EXT[0x80024de0]: Sending extension CERT TYPE (3 bytes) 3030 client|<3> EXT[0x80024de0]: Sending extension SAFE RENEGOTIATION (1 bytes) 3030 client|<3> EXT[0x80024de0]: Sending extension SUPPORTED ECC (12 bytes) 3030 client|<3> EXT[0x80024de0]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes) 3030 client|<3> HSK[0x80024de0]: CLIENT HELLO was queued [94 bytes] 3030 client|<7> HWRITE: enqueued [CLIENT HELLO] 94. Total 94 bytes. 3030 client|<7> HWRITE FLUSH: 94 bytes in buffer. 3030 client|<6> DTLS[0x80024de0]: Start of flight transmission. 3030 client|<6> DTLS[0x80024de0]: Sending Packet[0] fragment CLIENT HELLO(1) with length: 82, offset: 0, fragment length: 82 3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 94 3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 client|<7> WRITE: enqueued 107 bytes for 0x4. Total 107 bytes. 3030 client|<4> REC[0x80024de0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 107 3030 client|<7> WRITE FLUSH: 107 bytes in buffer. 3030 client|<7> WRITE: wrote 107 bytes, 0 bytes left. 3030 server|<2> ASSERT: gnutls_buffers.c:978 3030 server|<7> READ: Got 107 bytes from 0x5 3030 server|<7> READ: read 107 bytes from 0x5 3030 server|<7> RB: Have 0 bytes into buffer. Adding 107 bytes. 3030 server|<7> RB: Requested 13 bytes 3030 server|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 94 3030 server|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 server|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 94 3030 server|<4> REC[0x80024de0]: Decrypted Packet[0.0] Handshake(22) with length: 94 3030 server|<6> BUF[REC]: Inserted 94 bytes of Data(22) 3030 server|<3> HSK[0x80024de0]: CLIENT HELLO was received. Length 82[82], frag offset 0, frag length: 82, sequence: 0 3030 server|<3> HSK[0x80024de0]: Client's version: 254.255 3030 server|<2> ASSERT: gnutls_db.c:289 3030 server|<3> EXT[0x80024de0]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes) 3030 server|<3> EXT[0x80024de0]: Parsing extension 'CERT TYPE/9' (3 bytes) 3030 server|<2> ASSERT: cert_type.c:125 3030 server|<2> ASSERT: cert_type.c:125 3030 server|<2> ASSERT: cert_type.c:142 3030 server|<3> EXT[0x80024de0]: Parsing extension 'SUPPORTED ECC/10' (12 bytes) 3030 server|<3> HSK[0x80024de0]: Selected ECC curve SECP192R1 (5) 3030 server|<3> EXT[0x80024de0]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes) 3030 server|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 3030 server|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 3030 server|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 3030 server|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 3030 server|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 3030 server|<3> HSK[0x80024de0]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 3030 server|<3> HSK[0x80024de0]: Keeping ciphersuite: ECDH_ANON_AES_128_CBC_SHA1 (C0.18) 3030 server|<3> HSK[0x80024de0]: Keeping ciphersuite: ECDH_ANON_AES_256_CBC_SHA1 (C0.19) 3030 server|<3> HSK[0x80024de0]: Keeping ciphersuite: ECDH_ANON_3DES_EDE_CBC_SHA1 (C0.17) 3030 server|<3> HSK[0x80024de0]: Requested cipher suites[size: 6]: 3030 server|<3> 0xc0, 0x18 ECDH_ANON_AES_128_CBC_SHA1 3030 server|<3> HSK[0x80024de0]: Selected cipher suite: ECDH_ANON_AES_128_CBC_SHA1 3030 server|<3> HSK[0x80024de0]: Selected Compression Method: NULL 3030 server|<3> HSK[0x80024de0]: Safe renegotiation succeeded 3030 server|<3> EXT[0x80024de0]: Sending extension SAFE RENEGOTIATION (1 bytes) 3030 server|<3> EXT[0x80024de0]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes) 3030 server|<3> HSK[0x80024de0]: SessionID: e1542ba17a62e7db26d9ab75ff5230d52840b03a82204fdfa57ec80e2af3f84b 3030 server|<3> HSK[0x80024de0]: SERVER HELLO was queued [95 bytes] 3030 server|<7> HWRITE: enqueued [SERVER HELLO] 95. Total 95 bytes. 3030 server|<3> HSK[0x80024de0]: SERVER KEY EXCHANGE was queued [65 bytes] 3030 server|<7> HWRITE: enqueued [SERVER KEY EXCHANGE] 65. Total 160 bytes. 3030 server|<3> HSK[0x80024de0]: SERVER HELLO DONE was queued [12 bytes] 3030 server|<7> HWRITE: enqueued [SERVER HELLO DONE] 12. Total 172 bytes. 3030 server|<7> HWRITE FLUSH: 172 bytes in buffer. 3030 server|<6> DTLS[0x80024de0]: Start of flight transmission. 3030 server|<6> DTLS[0x80024de0]: Sending Packet[0] fragment SERVER HELLO(2) with length: 83, offset: 0, fragment length: 83 3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 95 3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 server|<7> WRITE: enqueued 108 bytes for 0x5. Total 108 bytes. 3030 server|<4> REC[0x80024de0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 108 3030 server|<6> DTLS[0x80024de0]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 53, offset: 0, fragment length: 53 3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 65 3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 server|<7> WRITE: enqueued 78 bytes for 0x5. Total 186 bytes. 3030 server|<4> REC[0x80024de0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 78 3030 server|<6> DTLS[0x80024de0]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0 3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 12 3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 server|<7> WRITE: enqueued 25 bytes for 0x5. Total 211 bytes. 3030 server|<4> REC[0x80024de0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 25 3030 server|<7> WRITE FLUSH: 211 bytes in buffer. 3030 client|<7> READ: Got 108 bytes from 0x4 3030 client|<7> READ: read 108 bytes from 0x4 3030 client|<7> RB: Have 0 bytes into buffer. Adding 108 bytes. 3030 client|<7> RB: Requested 13 bytes 3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 95 3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 95 3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.0] Handshake(22) with length: 95 3030 client|<6> BUF[REC]: Inserted 95 bytes of Data(22) 3030 client|<3> HSK[0x80024de0]: SERVER HELLO was received. Length 83[83], frag offset 0, frag length: 83, sequence: 0 3030 client|<6> DTLS[0x80024de0]: End of flight transmission. 3030 client|<2> ASSERT: gnutls_buffers.c:945 3030 client|<2> ASSERT: gnutls_buffers.c:1150 3030 client|<2> ASSERT: gnutls_buffers.c:1150 3030 client|<3> HSK[0x80024de0]: Server's version: 254.255 3030 client|<3> HSK[0x80024de0]: SessionID length: 32 3030 client|<3> HSK[0x80024de0]: SessionID: e1542ba17a62e7db26d9ab75ff5230d52840b03a82204fdfa57ec80e2af3f84b 3030 client|<3> HSK[0x80024de0]: Selected cipher suite: ECDH_ANON_AES_128_CBC_SHA1 3030 client|<3> HSK[0x80024de0]: Selected compression method: NULL (0) 3030 client|<3> EXT[0x80024de0]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes) 3030 client|<3> EXT[0x80024de0]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes) 3030 client|<3> HSK[0x80024de0]: Safe renegotiation succeeded 3030 server| dropping ServerKeyExchange 3030 server|<7> WRITE: wrote 211 bytes, 0 bytes left. 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 client|<7> READ: Got 25 bytes from 0x4 3030 client|<7> READ: read 25 bytes from 0x4 3030 client|<7> RB: Have 0 bytes into buffer. Adding 25 bytes. 3030 client|<7> RB: Requested 13 bytes 3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 12 3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 12 3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.2] Handshake(22) with length: 12 3030 client|<6> BUF[REC]: Inserted 12 bytes of Data(22) 3030 client|<3> HSK[0x80024de0]: SERVER HELLO DONE was received. Length 0[0], frag offset 0, frag length: 1, sequence: 2 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 client|<2> ASSERT: gnutls_kx.c:475 3030 server|<6> DTLS[0x80024de0]: re-Start of flight transmission. 3030 server|<6> DTLS[0x80024de0]: Sending Packet[0] fragment SERVER HELLO(2) with length: 83, offset: 0, fragment length: 83 3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 95 3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 server|<7> WRITE: enqueued 108 bytes for 0x5. Total 108 bytes. 3030 server|<4> REC[0x80024de0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 108 3030 server|<6> DTLS[0x80024de0]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 53, offset: 0, fragment length: 53 3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 65 3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 server|<7> WRITE: enqueued 78 bytes for 0x5. Total 186 bytes. 3030 server|<4> REC[0x80024de0]: Sent Packet[5] Handshake(22) in epoch 0 and length: 78 3030 server|<6> DTLS[0x80024de0]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0 3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 12 3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 server|<7> WRITE: enqueued 25 bytes for 0x5. Total 211 bytes. 3030 server|<4> REC[0x80024de0]: Sent Packet[6] Handshake(22) in epoch 0 and length: 25 3030 server|<7> WRITE FLUSH: 211 bytes in buffer. 3030 server| dropping ServerKeyExchange 3030 server|<7> WRITE: wrote 211 bytes, 0 bytes left. 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 client|<7> READ: Got 108 bytes from 0x4 3030 client|<7> READ: read 108 bytes from 0x4 3030 client|<7> RB: Have 0 bytes into buffer. Adding 108 bytes. 3030 client|<7> RB: Requested 13 bytes 3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 95 3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 95 3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.3] Handshake(22) with length: 95 3030 client|<6> BUF[REC]: Inserted 95 bytes of Data(22) 3030 client|<3> HSK[0x80024de0]: SERVER HELLO was received. Length 83[83], frag offset 0, frag length: 83, sequence: 0 3030 client| Discarded replayed handshake packet with sequence 0 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 client|<2> ASSERT: gnutls_kx.c:475 3030 server|<7> WRITE FLUSH: 0 bytes in buffer. 3030 server|<2> ASSERT: gnutls_buffers.c:575 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 client|<7> READ: Got 25 bytes from 0x4 3030 client|<7> READ: read 25 bytes from 0x4 3030 client|<7> RB: Have 0 bytes into buffer. Adding 25 bytes. 3030 client|<7> RB: Requested 13 bytes 3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 12 3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 12 3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.5] Handshake(22) with length: 12 3030 client|<6> BUF[REC]: Inserted 12 bytes of Data(22) 3030 client|<3> HSK[0x80024de0]: SERVER HELLO DONE was received. Length 0[0], frag offset 0, frag length: 1, sequence: 2 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 client|<2> ASSERT: gnutls_kx.c:475 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 server|<6> DTLS[0x80024de0]: re-Start of flight transmission. 3030 server|<6> DTLS[0x80024de0]: Sending Packet[0] fragment SERVER HELLO(2) with length: 83, offset: 0, fragment length: 83 3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 95 3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 server|<7> WRITE: enqueued 108 bytes for 0x5. Total 108 bytes. 3030 server|<4> REC[0x80024de0]: Sent Packet[7] Handshake(22) in epoch 0 and length: 108 3030 server|<6> DTLS[0x80024de0]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 53, offset: 0, fragment length: 53 3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 65 3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 server|<7> WRITE: enqueued 78 bytes for 0x5. Total 186 bytes. 3030 server|<4> REC[0x80024de0]: Sent Packet[8] Handshake(22) in epoch 0 and length: 78 3030 server|<6> DTLS[0x80024de0]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0 3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 12 3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 server|<7> WRITE: enqueued 25 bytes for 0x5. Total 211 bytes. 3030 server|<4> REC[0x80024de0]: Sent Packet[9] Handshake(22) in epoch 0 and length: 25 3030 server|<7> WRITE FLUSH: 211 bytes in buffer. 3030 client|<7> READ: Got 108 bytes from 0x4 3030 client|<7> READ: read 108 bytes from 0x4 3030 client|<7> RB: Have 0 bytes into buffer. Adding 108 bytes. 3030 client|<7> RB: Requested 13 bytes 3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 95 3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 95 3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.6] Handshake(22) with length: 95 3030 client|<6> BUF[REC]: Inserted 95 bytes of Data(22) 3030 client|<3> HSK[0x80024de0]: SERVER HELLO was received. Length 83[83], frag offset 0, frag length: 83, sequence: 0 3030 client| Discarded replayed handshake packet with sequence 0 3030 server| dropping ServerKeyExchange 3030 server|<7> WRITE: wrote 211 bytes, 0 bytes left. 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 client|<2> ASSERT: gnutls_kx.c:475 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 client|<7> READ: Got 25 bytes from 0x4 3030 client|<7> READ: read 25 bytes from 0x4 3030 client|<7> RB: Have 0 bytes into buffer. Adding 25 bytes. 3030 client|<7> RB: Requested 13 bytes 3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 12 3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 12 3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.8] Handshake(22) with length: 12 3030 client|<6> BUF[REC]: Inserted 12 bytes of Data(22) 3030 client|<3> HSK[0x80024de0]: SERVER HELLO DONE was received. Length 0[0], frag offset 0, frag length: 1, sequence: 2 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 client|<2> ASSERT: gnutls_kx.c:475 3030 server|<7> WRITE FLUSH: 0 bytes in buffer. 3030 server|<2> ASSERT: gnutls_buffers.c:575 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 server|<6> DTLS[0x80024de0]: re-Start of flight transmission. 3030 server|<6> DTLS[0x80024de0]: Sending Packet[0] fragment SERVER HELLO(2) with length: 83, offset: 0, fragment length: 83 3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 95 3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 server|<7> WRITE: enqueued 108 bytes for 0x5. Total 108 bytes. 3030 server|<4> REC[0x80024de0]: Sent Packet[10] Handshake(22) in epoch 0 and length: 108 3030 server|<6> DTLS[0x80024de0]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 53, offset: 0, fragment length: 53 3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 65 3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 server|<7> WRITE: enqueued 78 bytes for 0x5. Total 186 bytes. 3030 server|<4> REC[0x80024de0]: Sent Packet[11] Handshake(22) in epoch 0 and length: 78 3030 server|<6> DTLS[0x80024de0]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0 3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 12 3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 server|<7> WRITE: enqueued 25 bytes for 0x5. Total 211 bytes. 3030 server|<4> REC[0x80024de0]: Sent Packet[12] Handshake(22) in epoch 0 and length: 25 3030 server|<7> WRITE FLUSH: 211 bytes in buffer. 3030 client|<7> READ: Got 108 bytes from 0x4 3030 client|<7> READ: read 108 bytes from 0x4 3030 client|<7> RB: Have 0 bytes into buffer. Adding 108 bytes. 3030 client|<7> RB: Requested 13 bytes 3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 95 3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 95 3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.9] Handshake(22) with length: 95 3030 client|<6> BUF[REC]: Inserted 95 bytes of Data(22) 3030 client|<3> HSK[0x80024de0]: SERVER HELLO was received. Length 83[83], frag offset 0, frag length: 83, sequence: 0 3030 client| Discarded replayed handshake packet with sequence 0 3030 server|<7> WRITE: wrote 211 bytes, 0 bytes left. 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 client|<2> ASSERT: gnutls_kx.c:475 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 client|<7> READ: Got 25 bytes from 0x4 3030 client|<7> READ: read 25 bytes from 0x4 3030 client|<7> RB: Have 0 bytes into buffer. Adding 25 bytes. 3030 client|<7> RB: Requested 13 bytes 3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 12 3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 12 3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.11] Handshake(22) with length: 12 3030 client|<6> BUF[REC]: Inserted 12 bytes of Data(22) 3030 client|<3> HSK[0x80024de0]: SERVER HELLO DONE was received. Length 0[0], frag offset 0, frag length: 1, sequence: 2 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 client|<2> ASSERT: gnutls_kx.c:475 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 client|<7> READ: Got 78 bytes from 0x4 3030 client|<7> READ: read 78 bytes from 0x4 3030 client|<7> RB: Have 0 bytes into buffer. Adding 78 bytes. 3030 client|<7> RB: Requested 13 bytes 3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 65 3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 65 3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.10] Handshake(22) with length: 65 3030 client|<6> BUF[REC]: Inserted 65 bytes of Data(22) 3030 client|<3> HSK[0x80024de0]: SERVER KEY EXCHANGE was received. Length 53[53], frag offset 0, frag length: 53, sequence: 1 3030 client|<3> HSK[0x80024de0]: Selected ECC curve SECP192R1 (5) 3030 client|<2> ASSERT: gnutls_buffers.c:1150 3030 client|<3> HSK[0x80024de0]: CLIENT KEY EXCHANGE was queued [62 bytes] 3030 client|<7> HWRITE: enqueued [CLIENT KEY EXCHANGE] 62. Total 62 bytes. 3030 client|<7> HWRITE: enqueued [CHANGE CIPHER SPEC] 1. Total 63 bytes. 3030 client|<3> REC[0x80024de0]: Sent ChangeCipherSpec 3030 client|<9> INT: PREMASTER SECRET[24]: 46924e89a251944ffa68f7f301fc769c4ecd5c36c588f5ca 3030 client|<9> INT: CLIENT RANDOM[32]: 4fdda83afc0fe00adedd5fcd60b9f4f92d7469c5db56441e0aadcc0236877ab8 3030 client|<9> INT: SERVER RANDOM[32]: 4fdda83a5a07acca23a6223b671d7d5f9f9efb4072ee42c0b736794c470c247e 3030 client|<9> INT: MASTER SECRET: fbfc4b16ccec1aaf7696fba97aaaef1082b3594fcf1ec6560b7e207a857661a0753fbaf7d385dc376685704e0d8c9d75 3030 client|<4> REC[0x80024de0]: Initializing epoch #1 3030 client|<9> INT: KEY BLOCK[104]: b81f84d53053f2f3dc3c53bdcb220c179daf04052ea1e310fe2b1f5095461247 3030 client|<9> INT: CLIENT WRITE KEY [16]: d8764c81dc569d4893c535910aad3991 3030 client|<9> INT: SERVER WRITE KEY [16]: c55e4c593100030051baa4bba6eb1dba 3030 client|<4> REC[0x80024de0]: Epoch #1 ready 3030 client|<3> HSK[0x80024de0]: Cipher Suite: ECDH_ANON_AES_128_CBC_SHA1 3030 client|<3> HSK[0x80024de0]: Initializing internal [write] cipher sessions 3030 client|<3> HSK[0x80024de0]: recording tls-unique CB (send) 3030 client|<3> HSK[0x80024de0]: FINISHED was queued [24 bytes] 3030 client|<7> HWRITE: enqueued [FINISHED] 24. Total 87 bytes. 3030 client|<7> HWRITE FLUSH: 87 bytes in buffer. 3030 client|<6> DTLS[0x80024de0]: Start of flight transmission. 3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CLIENT KEY EXCHANGE(16) with length: 50, offset: 0, fragment length: 50 3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 62 3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 client|<7> WRITE: enqueued 75 bytes for 0x4. Total 75 bytes. 3030 client|<4> REC[0x80024de0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 75 3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CHANGE CIPHER SPEC(254) 3030 client|<4> REC[0x80024de0]: Preparing Packet ChangeCipherSpec(20) with length: 1 3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 client|<7> WRITE: enqueued 14 bytes for 0x4. Total 89 bytes. 3030 client|<4> REC[0x80024de0]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 14 3030 client|<6> DTLS[0x80024de0]: Sending Packet[2] fragment FINISHED(20) with length: 12, offset: 0, fragment length: 12 3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 24 3030 client|<9> ENC[0x80024de0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1 3030 client|<7> WRITE: enqueued 77 bytes for 0x4. Total 166 bytes. 3030 client|<4> REC[0x80024de0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 77 3030 client|<7> WRITE FLUSH: 166 bytes in buffer. 3030 client| dropping ClientKeyExchange 3030 client| dropping ClientFinished 3030 client|<7> WRITE: wrote 166 bytes, 0 bytes left. 3030 client|<2> ASSERT: session_ticket.c:684 3030 server|<7> READ: Got 14 bytes from 0x5 3030 server|<7> READ: read 14 bytes from 0x5 3030 server|<7> RB: Have 0 bytes into buffer. Adding 14 bytes. 3030 server|<7> RB: Requested 13 bytes 3030 server|<4> REC[0x80024de0]: SSL 254.255 ChangeCipherSpec packet received. Epoch 0, length: 1 3030 server|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 server|<4> REC[0x80024de0]: Received Packet ChangeCipherSpec(20) with length: 1 3030 server|<4> REC[0x80024de0]: Decrypted Packet[0.2] ChangeCipherSpec(20) with length: 1 3030 server|<6> BUF[REC]: Inserted 1 bytes of Data(20) 3030 server|<2> ASSERT: gnutls_buffers.c:1078 3030 server|<2> ASSERT: gnutls_dtls.c:192 3030 server|<7> WRITE FLUSH: 0 bytes in buffer. 3030 server|<2> ASSERT: gnutls_buffers.c:575 3030 client|<6> DTLS[0x80024de0]: re-Start of flight transmission. 3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CLIENT KEY EXCHANGE(16) with length: 50, offset: 0, fragment length: 50 3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 62 3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 client|<7> WRITE: enqueued 75 bytes for 0x4. Total 75 bytes. 3030 client|<4> REC[0x80024de0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 75 3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CHANGE CIPHER SPEC(254) 3030 client|<4> REC[0x80024de0]: Preparing Packet ChangeCipherSpec(20) with length: 1 3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 client|<7> WRITE: enqueued 14 bytes for 0x4. Total 89 bytes. 3030 client|<4> REC[0x80024de0]: Sent Packet[5] ChangeCipherSpec(20) in epoch 0 and length: 14 3030 client|<6> DTLS[0x80024de0]: Sending Packet[2] fragment FINISHED(20) with length: 12, offset: 0, fragment length: 12 3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 24 3030 client|<9> ENC[0x80024de0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1 3030 client|<7> WRITE: enqueued 77 bytes for 0x4. Total 166 bytes. 3030 client|<4> REC[0x80024de0]: Sent Packet[2] Handshake(22) in epoch 1 and length: 77 3030 client|<7> WRITE FLUSH: 166 bytes in buffer. 3030 client| dropping ClientKeyExchange 3030 client| dropping ClientFinished 3030 server|<7> READ: Got 14 bytes from 0x5 3030 server|<7> READ: read 14 bytes from 0x5 3030 server|<7> RB: Have 0 bytes into buffer. Adding 14 bytes. 3030 server|<7> RB: Requested 13 bytes 3030 server|<4> REC[0x80024de0]: SSL 254.255 ChangeCipherSpec packet received. Epoch 0, length: 1 3030 server|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 server|<4> REC[0x80024de0]: Received Packet ChangeCipherSpec(20) with length: 1 3030 server|<4> REC[0x80024de0]: Decrypted Packet[0.4] ChangeCipherSpec(20) with length: 1 3030 server|<6> BUF[REC]: Inserted 1 bytes of Data(20) 3030 server|<2> ASSERT: gnutls_buffers.c:1078 3030 server|<2> ASSERT: gnutls_buffers.c:1078 3030 server|<2> ASSERT: gnutls_dtls.c:192 3030 server|<7> WRITE FLUSH: 0 bytes in buffer. 3030 server|<2> ASSERT: gnutls_buffers.c:575 3030 client|<7> WRITE: wrote 166 bytes, 0 bytes left. 3030 client|<2> ASSERT: gnutls_dtls.c:436 3030 client|<2> ASSERT: gnutls_handshake.c:2689 3030 client|<6> DTLS[0x80024de0]: re-Start of flight transmission. 3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CLIENT KEY EXCHANGE(16) with length: 50, offset: 0, fragment length: 50 3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 62 3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 client|<7> WRITE: enqueued 75 bytes for 0x4. Total 75 bytes. 3030 client|<4> REC[0x80024de0]: Sent Packet[6] Handshake(22) in epoch 0 and length: 75 3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CHANGE CIPHER SPEC(254) 3030 client|<4> REC[0x80024de0]: Preparing Packet ChangeCipherSpec(20) with length: 1 3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 client|<7> WRITE: enqueued 14 bytes for 0x4. Total 89 bytes. 3030 client|<4> REC[0x80024de0]: Sent Packet[7] ChangeCipherSpec(20) in epoch 0 and length: 14 3030 client|<6> DTLS[0x80024de0]: Sending Packet[2] fragment FINISHED(20) with length: 12, offset: 0, fragment length: 12 3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 24 3030 client|<9> ENC[0x80024de0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1 3030 client|<7> WRITE: enqueued 77 bytes for 0x4. Total 166 bytes. 3030 client|<4> REC[0x80024de0]: Sent Packet[3] Handshake(22) in epoch 1 and length: 77 3030 client|<7> WRITE FLUSH: 166 bytes in buffer. 3030 client| dropping ClientKeyExchange 3030 server|<7> READ: Got 14 bytes from 0x5 3030 server|<7> READ: read 14 bytes from 0x5 3030 server|<7> RB: Have 0 bytes into buffer. Adding 14 bytes. 3030 server|<7> RB: Requested 13 bytes 3030 server|<4> REC[0x80024de0]: SSL 254.255 ChangeCipherSpec packet received. Epoch 0, length: 1 3030 server|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 server|<4> REC[0x80024de0]: Received Packet ChangeCipherSpec(20) with length: 1 3030 server|<4> REC[0x80024de0]: Decrypted Packet[0.6] ChangeCipherSpec(20) with length: 1 3030 server|<6> BUF[REC]: Inserted 1 bytes of Data(20) 3030 server|<2> ASSERT: gnutls_buffers.c:1078 3030 server|<2> ASSERT: gnutls_buffers.c:1078 3030 server|<2> ASSERT: gnutls_buffers.c:1078 3030 server|<2> ASSERT: gnutls_dtls.c:192 3030 server|<7> WRITE FLUSH: 0 bytes in buffer. 3030 server|<2> ASSERT: gnutls_buffers.c:575 3030 client| dropping ClientFinished 3030 client|<7> WRITE: wrote 166 bytes, 0 bytes left. 3030 client|<2> ASSERT: gnutls_dtls.c:436 3030 client|<2> ASSERT: gnutls_handshake.c:2689 3030 client|<6> DTLS[0x80024de0]: re-Start of flight transmission. 3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CLIENT KEY EXCHANGE(16) with length: 50, offset: 0, fragment length: 50 3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 62 3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 client|<7> WRITE: enqueued 75 bytes for 0x4. Total 75 bytes. 3030 client|<4> REC[0x80024de0]: Sent Packet[8] Handshake(22) in epoch 0 and length: 75 3030 client|<6> DTLS[0x80024de0]: Sending Packet[1] fragment CHANGE CIPHER SPEC(254) 3030 client|<4> REC[0x80024de0]: Preparing Packet ChangeCipherSpec(20) with length: 1 3030 client|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 client|<7> WRITE: enqueued 14 bytes for 0x4. Total 89 bytes. 3030 client|<4> REC[0x80024de0]: Sent Packet[9] ChangeCipherSpec(20) in epoch 0 and length: 14 3030 client|<6> DTLS[0x80024de0]: Sending Packet[2] fragment FINISHED(20) with length: 12, offset: 0, fragment length: 12 3030 client|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 24 3030 client|<9> ENC[0x80024de0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1 3030 client|<7> WRITE: enqueued 77 bytes for 0x4. Total 166 bytes. 3030 client|<4> REC[0x80024de0]: Sent Packet[4] Handshake(22) in epoch 1 and length: 77 3030 client|<7> WRITE FLUSH: 166 bytes in buffer. 3030 server|<7> READ: Got 75 bytes from 0x5 3030 server|<7> READ: read 75 bytes from 0x5 3030 server|<7> RB: Have 0 bytes into buffer. Adding 75 bytes. 3030 server|<7> RB: Requested 13 bytes 3030 server|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 0, length: 62 3030 server|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 server|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 62 3030 server|<4> REC[0x80024de0]: Decrypted Packet[0.7] Handshake(22) with length: 62 3030 server|<6> BUF[REC]: Inserted 62 bytes of Data(22) 3030 server|<2> ASSERT: gnutls_buffers.c:1078 3030 server|<2> ASSERT: gnutls_buffers.c:1078 3030 server|<2> ASSERT: gnutls_buffers.c:1078 3030 server|<3> HSK[0x80024de0]: CLIENT KEY EXCHANGE was received. Length 50[50], frag offset 0, frag length: 50, sequence: 1 3030 server|<6> DTLS[0x80024de0]: End of flight transmission. 3030 server|<2> ASSERT: gnutls_buffers.c:1150 3030 server|<9> INT: PREMASTER SECRET[24]: 46924e89a251944ffa68f7f301fc769c4ecd5c36c588f5ca 3030 client|<7> WRITE: wrote 166 bytes, 0 bytes left. 3030 server|<9> INT: CLIENT RANDOM[32]: 4fdda83afc0fe00adedd5fcd60b9f4f92d7469c5db56441e0aadcc0236877ab8 3030 server|<9> INT: SERVER RANDOM[32]: 4fdda83a5a07acca23a6223b671d7d5f9f9efb4072ee42c0b736794c470c247e 3030 server|<9> INT: MASTER SECRET: fbfc4b16ccec1aaf7696fba97aaaef1082b3594fcf1ec6560b7e207a857661a0753fbaf7d385dc376685704e0d8c9d75 3030 server|<4> REC[0x80024de0]: Initializing epoch #1 3030 server|<9> INT: KEY BLOCK[104]: b81f84d53053f2f3dc3c53bdcb220c179daf04052ea1e310fe2b1f5095461247 3030 server|<9> INT: CLIENT WRITE KEY [16]: d8764c81dc569d4893c535910aad3991 3030 server|<9> INT: SERVER WRITE KEY [16]: c55e4c593100030051baa4bba6eb1dba 3030 server|<4> REC[0x80024de0]: Epoch #1 ready 3030 server|<3> HSK[0x80024de0]: Cipher Suite: ECDH_ANON_AES_128_CBC_SHA1 3030 client|<2> ASSERT: gnutls_dtls.c:436 3030 client|<2> ASSERT: gnutls_handshake.c:2689 3030 server|<2> ASSERT: gnutls_buffers.c:978 3030 server|<2> ASSERT: gnutls_buffers.c:1078 3030 server|<2> ASSERT: gnutls_buffers.c:1078 3030 server|<2> ASSERT: gnutls_buffers.c:978 3030 server|<7> READ: Got 14 bytes from 0x5 3030 server|<7> READ: read 14 bytes from 0x5 3030 server|<7> RB: Have 0 bytes into buffer. Adding 14 bytes. 3030 server|<7> RB: Requested 13 bytes 3030 server|<4> REC[0x80024de0]: SSL 254.255 ChangeCipherSpec packet received. Epoch 0, length: 1 3030 server|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 server|<4> REC[0x80024de0]: Received Packet ChangeCipherSpec(20) with length: 1 3030 server|<2> ASSERT: gnutls_cipher.c:513 3030 server|<2> ASSERT: gnutls_cipher.c:162 3030 server|<2> ASSERT: gnutls_record.c:1039 3030 server| Discarded message[8] due to invalid decryption 3030 server|<2> ASSERT: gnutls_record.c:1127 3030 server|<2> ASSERT: gnutls_handshake.c:685 3030 server|<2> ASSERT: gnutls_handshake.c:2734 3030 server|<2> ASSERT: gnutls_buffers.c:978 3030 server|<2> ASSERT: gnutls_buffers.c:1078 3030 server|<2> ASSERT: gnutls_buffers.c:1078 3030 server|<2> ASSERT: gnutls_buffers.c:978 3030 server|<7> READ: Got 77 bytes from 0x5 3030 server|<7> READ: read 77 bytes from 0x5 3030 server|<7> RB: Have 0 bytes into buffer. Adding 77 bytes. 3030 server|<7> RB: Requested 13 bytes 3030 server|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 1, length: 64 3030 server|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 server|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 64 3030 server|<4> REC[0x80024de0]: Decrypted Packet[1.3] Handshake(22) with length: 24 3030 server|<6> BUF[REC]: Inserted 24 bytes of Data(22) 3030 server|<2> ASSERT: gnutls_buffers.c:1078 3030 server|<2> ASSERT: gnutls_buffers.c:1078 3030 server|<3> HSK[0x80024de0]: FINISHED was received. Length 12[12], frag offset 0, frag length: 12, sequence: 2 3030 server|<3> HSK[0x80024de0]: recording tls-unique CB (recv) 3030 server|<7> HWRITE: enqueued [CHANGE CIPHER SPEC] 1. Total 1 bytes. 3030 server|<3> REC[0x80024de0]: Sent ChangeCipherSpec 3030 server|<3> HSK[0x80024de0]: Cipher Suite: ECDH_ANON_AES_128_CBC_SHA1 3030 server|<3> HSK[0x80024de0]: Initializing internal [write] cipher sessions 3030 server|<3> HSK[0x80024de0]: FINISHED was queued [24 bytes] 3030 server|<7> HWRITE: enqueued [FINISHED] 24. Total 25 bytes. 3030 server|<7> HWRITE FLUSH: 25 bytes in buffer. 3030 server|<6> DTLS[0x80024de0]: Start of flight transmission. 3030 server|<6> DTLS[0x80024de0]: Sending Packet[2] fragment CHANGE CIPHER SPEC(254) 3030 server|<4> REC[0x80024de0]: Preparing Packet ChangeCipherSpec(20) with length: 1 3030 server|<9> ENC[0x80024de0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 3030 server|<7> WRITE: enqueued 14 bytes for 0x5. Total 14 bytes. 3030 server|<4> REC[0x80024de0]: Sent Packet[13] ChangeCipherSpec(20) in epoch 0 and length: 14 3030 server|<6> DTLS[0x80024de0]: Sending Packet[3] fragment FINISHED(20) with length: 12, offset: 0, fragment length: 12 3030 server|<4> REC[0x80024de0]: Preparing Packet Handshake(22) with length: 24 3030 server|<9> ENC[0x80024de0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1 3030 server|<7> WRITE: enqueued 77 bytes for 0x5. Total 91 bytes. 3030 server|<4> REC[0x80024de0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 77 3030 server|<7> WRITE FLUSH: 91 bytes in buffer. 3030 server|<7> WRITE: wrote 91 bytes, 0 bytes left. 3030 server|<6> DTLS[0x80024de0]: Initializing timer for handshake state. 3030 server|<4> REC[0x80024de0]: Start of epoch cleanup 3030 server|<4> REC[0x80024de0]: Note inactive epoch 0 has 1 users 3030 server|<4> REC[0x80024de0]: End of epoch cleanup 3030 server| Discarded unexpected ChangeCipherSpec (20) packet (expecting: Application Data (23)) 3030 server|<2> ASSERT: gnutls_buffers.c:124 3030 server|<2> ASSERT: gnutls_record.c:515 3030 server| Discarded unexpected ChangeCipherSpec (20) packet (expecting: Application Data (23)) 3030 server|<2> ASSERT: gnutls_buffers.c:124 3030 server|<2> ASSERT: gnutls_record.c:515 3030 client|<7> READ: Got 14 bytes from 0x4 3030 client|<7> READ: read 14 bytes from 0x4 3030 client|<7> RB: Have 0 bytes into buffer. Adding 14 bytes. 3030 client|<7> RB: Requested 13 bytes 3030 client|<4> REC[0x80024de0]: SSL 254.255 ChangeCipherSpec packet received. Epoch 0, length: 1 3030 client|<4> REC[0x80024de0]: Expected Packet ChangeCipherSpec(20) 3030 client|<4> REC[0x80024de0]: Received Packet ChangeCipherSpec(20) with length: 1 3030 client|<4> REC[0x80024de0]: Decrypted Packet[0.12] ChangeCipherSpec(20) with length: 1 3030 client|<6> BUF[REC]: Inserted 1 bytes of Data(20) 3030 client|<3> HSK[0x80024de0]: Cipher Suite: ECDH_ANON_AES_128_CBC_SHA1 3030 client|<2> ASSERT: gnutls_buffers.c:978 3030 client|<7> READ: Got 77 bytes from 0x4 3030 client|<7> READ: read 77 bytes from 0x4 3030 client|<7> RB: Have 0 bytes into buffer. Adding 77 bytes. 3030 client|<7> RB: Requested 13 bytes 3030 client|<4> REC[0x80024de0]: SSL 254.255 Handshake packet received. Epoch 1, length: 64 3030 client|<4> REC[0x80024de0]: Expected Packet Handshake(22) 3030 client|<4> REC[0x80024de0]: Received Packet Handshake(22) with length: 64 3030 client|<4> REC[0x80024de0]: Decrypted Packet[1.0] Handshake(22) with length: 24 3030 client|<6> BUF[REC]: Inserted 24 bytes of Data(22) 3030 client|<3> HSK[0x80024de0]: FINISHED was received. Length 12[12], frag offset 0, frag length: 12, sequence: 3 3030 client|<4> REC[0x80024de0]: Start of epoch cleanup 3030 client|<4> REC[0x80024de0]: Epoch #0 freed 3030 client|<4> REC[0x80024de0]: End of epoch cleanup 3030 client|<4> REC[0x80024de0]: Start of epoch cleanup 3030 client|<4> REC[0x80024de0]: End of epoch cleanup 3030 client|<4> REC[0x80024de0]: Preparing Packet Application Data(23) with length: 7 3030 client|<9> ENC[0x80024de0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1 3030 client|<7> WRITE: enqueued 61 bytes for 0x4. Total 61 bytes. 3030 client|<7> WRITE FLUSH: 61 bytes in buffer. 3030 client|<7> WRITE: wrote 61 bytes, 0 bytes left. 3030 client|<4> REC[0x80024de0]: Sent Packet[5] Application Data(23) in epoch 1 and length: 61 3030 server|<7> READ: Got 61 bytes from 0x5 3030 server|<7> READ: read 61 bytes from 0x5 3030 server|<7> RB: Have 0 bytes into buffer. Adding 61 bytes. 3030 server|<7> RB: Requested 13 bytes 3030 server|<4> REC[0x80024de0]: SSL 254.255 Application Data packet received. Epoch 1, length: 48 3030 server|<4> REC[0x80024de0]: Expected Packet Application Data(23) 3030 server|<4> REC[0x80024de0]: Received Packet Application Data(23) with length: 48 3030 server|<4> REC[0x80024de0]: Decrypted Packet[1.4] Application Data(23) with length: 7 3030 server|<6> BUF[REC]: Inserted 7 bytes of Data(23) 3030 server|<6> DTLS[0x80024de0]: Deinitializing previous handshake state. 3030 server|<4> REC[0x80024de0]: Start of epoch cleanup 3030 server|<4> REC[0x80024de0]: Epoch #0 freed 3030 server|<4> REC[0x80024de0]: End of epoch cleanup 3030 server|<4> REC[0x80024de0]: Preparing Packet Application Data(23) with length: 7 3030 server|<9> ENC[0x80024de0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1 3030 server|<7> WRITE: enqueued 61 bytes for 0x5. Total 61 bytes. 3030 server|<7> WRITE FLUSH: 61 bytes in buffer. 3030 server|<7> WRITE: wrote 61 bytes, 0 bytes left. 3030 server|<4> REC[0x80024de0]: Sent Packet[2] Application Data(23) in epoch 1 and length: 61 3030 client|<7> READ: Got 61 bytes from 0x4 3030 client|<7> READ: read 61 bytes from 0x4 3030 client|<7> RB: Have 0 bytes into buffer. Adding 61 bytes. 3030 client|<7> RB: Requested 13 bytes 3030 client|<4> REC[0x80024de0]: SSL 254.255 Application Data packet received. Epoch 1, length: 48 3030 client|<4> REC[0x80024de0]: Expected Packet Application Data(23) 3030 client|<4> REC[0x80024de0]: Received Packet Application Data(23) with length: 48 3030 client|<4> REC[0x80024de0]: Decrypted Packet[1.1] Application Data(23) with length: 7 3030 client|<6> BUF[REC]: Inserted 7 bytes of Data(23) 3030 -- SHello(021), SFinished(01), CFinished(012) :- SKeyExchange, CKeyExchange, CFinished 1 From n.mavrogiannopoulos at gmail.com Tue Jun 19 00:38:05 2012 From: n.mavrogiannopoulos at gmail.com (Nikos Mavrogiannopoulos) Date: Tue, 19 Jun 2012 00:38:05 +0200 Subject: dtls-stress on s390x In-Reply-To: <20120617095732.GA2589@downhill.g.la> References: <20120617095732.GA2589@downhill.g.la> Message-ID: <4FDFADCD.1040400@gmail.com> On 06/17/2012 11:57 AM, Andreas Metzler wrote: > Hello, > > the dtls test of 3.0.20 (and .19, now too) fails on S390x. Any idea what's > wrong? > > Find attached a log of > ./dtls-stress -d 4712 -shello 021 -sfinished 01 -cfinished 012 SKeyExchange CKeyExchange CFinished The handshake under test seems correct. Could it be the attached patch? regards, Nikos -------------- next part -------------- An embedded and charset-unspecified text was scrubbed... Name: p.txt URL: From nmav at gnutls.org Wed Jun 20 19:24:09 2012 From: nmav at gnutls.org (Nikos Mavrogiannopoulos) Date: Wed, 20 Jun 2012 19:24:09 +0200 Subject: [PATCH] build: make sure to declare the generated source files as BUILT_SOURCES In-Reply-To: <1339787952-740687-1-git-send-email-flameeyes@flameeyes.eu> References: <1339787952-740687-1-git-send-email-flameeyes@flameeyes.eu> Message-ID: <4FE20739.2090108@gnutls.org> Thank you. Applied. On 06/15/2012 09:19 PM, Diego Elio Petten? wrote: > This allows proper building when using parallel make on a multi-core > system. > > Signed-off-by: Diego Elio Petten? > --- > src/Makefile.am | 3 +++ > 1 files changed, 3 insertions(+), 0 deletions(-) > > diff --git a/src/Makefile.am b/src/Makefile.am > index 5550f3b..8b3b578 100644 > --- a/src/Makefile.am > +++ b/src/Makefile.am > @@ -150,6 +150,9 @@ libcmd_p11tool_la_LIBADD += ../gl/libgnu.la $(INET_PTON_LIB) > > endif # ENABLE_PKCS11 > > +BUILT_SOURCES = ocsptool-args.c p11tool-args.c psk-args.c cli-debug-args.c \ > + cli-args.c serv-args.c srptool-args.c certtool-args.c > + > ocsptool-args.c: $(srcdir)/args-std.def $(srcdir)/ocsptool-args.def > -autogen ocsptool-args.def > p11tool-args.c: $(srcdir)/args-std.def $(srcdir)/p11tool-args.def From ametzler at downhill.at.eu.org Fri Jun 22 19:28:40 2012 From: ametzler at downhill.at.eu.org (Andreas Metzler) Date: Fri, 22 Jun 2012 19:28:40 +0200 Subject: dtls-stress on s390x In-Reply-To: <4FDFADCD.1040400@gmail.com> References: <20120617095732.GA2589@downhill.g.la> <4FDFADCD.1040400@gmail.com> Message-ID: <20120622172840.GB2688@downhill.g.la> On 2012-06-19 Nikos Mavrogiannopoulos wrote: > On 06/17/2012 11:57 AM, Andreas Metzler wrote: > > the dtls test of 3.0.20 (and .19, now too) fails on S390x. Any idea what's > > wrong? > > > > Find attached a log of > > ./dtls-stress -d 4712 -shello 021 -sfinished 01 -cfinished 012 SKeyExchange CKeyExchange CFinished > The handshake under test seems correct. Could it be the attached patch? [...] Yes! The patch seems to have solved the issue. https://buildd.debian.org/status/logs.php?pkg=gnutls28&arch=s390x thanks, cu Andreas From INVALID.NOREPLY at gnu.org Sun Jun 24 00:17:56 2012 From: INVALID.NOREPLY at gnu.org (Lucas Fisher) Date: Sat, 23 Jun 2012 22:17:56 +0000 Subject: [sr #108078] [PATCH] Certtool exports multiple keys in PKCS12 file Message-ID: <20120623-221755.sv88485.890@savannah.gnu.org> URL: Summary: [PATCH] Certtool exports multiple keys in PKCS12 file Project: GnuTLS Submitted by: ljfisher Submitted on: Sat 23 Jun 2012 10:17:55 PM GMT Category: Included programs Priority: 5 - Normal Severity: 3 - Normal Status: None Privacy: Public Assigned to: None Originator Email: Open/Closed: Open Discussion Lock: Any Operating System: None _______________________________________________________ Details: This is a patch that updates certtool to export multiple keys in a PKCS12 file. I needed to generate PKCS12 files with mutliple certificate/key pairs in one file for testing on another project. It should be useful for others. If anything needs to be changed please let me know. _______________________________________________________ File Attachments: ------------------------------------------------------- Date: Sat 23 Jun 2012 10:17:55 PM GMT Name: 0001-Certtool-exports-multiple-keys-in-PKCS12-file.patch Size: 5kB By: ljfisher _______________________________________________________ Reply to this item at: _______________________________________________ Message sent via/by Savannah http://savannah.gnu.org/ From INVALID.NOREPLY at gnu.org Sun Jun 24 20:35:19 2012 From: INVALID.NOREPLY at gnu.org (Nikos Mavrogiannopoulos) Date: Sun, 24 Jun 2012 18:35:19 +0000 Subject: [sr #108078] [PATCH] Certtool exports multiple keys in PKCS12 file In-Reply-To: <20120623-221755.sv88485.890@savannah.gnu.org> References: <20120623-221755.sv88485.890@savannah.gnu.org> Message-ID: <20120624-213519.sv707.96176@savannah.gnu.org> Update of sr #108078 (project gnutls): Status: None => Confirmed Assigned to: None => nmav _______________________________________________________ Follow-up Comment #1: Hello, Would you be willing to assign the copyright of this patch to FSF, so we can easily include it? To assign these changes: http://git.savannah.gnu.org/cgit/gnulib.git/tree/doc/Copyright/request-assign.changes Or preferably these or any other future ones: http://git.savannah.gnu.org/cgit/gnulib.git/tree/doc/Copyright/request-assign.future regards, Nikos _______________________________________________________ Reply to this item at: _______________________________________________ Message sent via/by Savannah http://savannah.gnu.org/ From mmfwwijnen at gmail.com Mon Jun 25 01:18:29 2012 From: mmfwwijnen at gmail.com (Marcel Wijnen) Date: Sun, 24 Jun 2012 16:18:29 -0700 (PDT) Subject: NXWEB 3.0 is out (adds SSL, http proxy, and even better performance) In-Reply-To: References: <4F22FCC9.2020009@gnutls.org> <4F789DD5.3050706@gnutls.org> Message-ID: <5901fc60-f848-46f6-9009-20c18e80f03b@googlegroups.com> Hi Yaroslav, Since I'm trying to set nxweb up with ssl, I've configures with "./configure --with-gnutls". The configuration seems to work (all tests are ran and the configuration does not end with any failures). Then I make and sudo make install. During this process I see that a key is generated and in the ssl folder I think that the key and certificate are present /nxweb-3.0.1-dev/ssl/ca.cfg /nxweb-3.0.1-dev/ssl/ca_cert.pem /nxweb-3.0.1-dev/ssl/ca_key.pem /nxweb-3.0.1-dev/ssl/dh.pem /nxweb-3.0.1-dev/ssl/Makefile /nxweb-3.0.1-dev/ssl/Makefile.am /nxweb-3.0.1-dev/ssl/Makefile.in /nxweb-3.0.1-dev/ssl/server.cfg /nxweb-3.0.1-dev/ssl/server_cert.pem /nxweb-3.0.1-dev/ssl/server_key.pem When I run *./nxweb *I get the following output and error message *2012-06-25 01:07:00 [14276:0xb73788e0]: nxweb binding :8055 for http 2012-06-25 01:07:00 [14276:0xb73788e0]: nxweb binding :8056 for https 2012-06-25 01:07:00 [14276:0xb73788e0]: No certificate or key were found * Is there something trivial that I've forgotten to do here? Should I use any flags or do some additional configuration? Could you help me out on this? Thanks in advance. Best, Marcel On Sunday, April 1, 2012 9:11:46 PM UTC+2, Yaroslav wrote: > > Hi Nikos, > > That's good. Thank you very much for the reference. > > http://vincent.bernat.im/en/blog/2011-ssl-benchmark-round2.html > Have you seen those benchmarks? There was no GnuTLS tested but now I think > it could be. Do you happen to know the author? > > Yaroslav > > On Sun, Apr 1, 2012 at 10:26 PM, Nikos Mavrogiannopoulos wrote: > >> On 01/27/2012 08:52 PM, Yaroslav wrote: >> >> > I'd be happy if somene could do independent benchmarks of nxweb on >> > different hardware. So that we know for sure that it is all true :) >> >> >> Hello Yaroslav, >> I've done benchmarks on a small system and pretty much verify your >> results. I've put at: >> >> http://nikmav.blogspot.com/2012/04/in-some-embedded-systems-space-may.html >> >> regards, >> Nikos >> >> PS. I've modified httpress to print "rps" as floating point, because the >> numbers were really small for this system. >> > > -------------- next part -------------- An HTML attachment was scrubbed... URL: From mmfwwijnen at gmail.com Mon Jun 25 01:29:01 2012 From: mmfwwijnen at gmail.com (Marcel Wijnen) Date: Sun, 24 Jun 2012 16:29:01 -0700 (PDT) Subject: NXWEB 3.0 is out (adds SSL, http proxy, and even better performance) In-Reply-To: <5901fc60-f848-46f6-9009-20c18e80f03b@googlegroups.com> References: <4F22FCC9.2020009@gnutls.org> <4F789DD5.3050706@gnutls.org> <5901fc60-f848-46f6-9009-20c18e80f03b@googlegroups.com> Message-ID: <71cb832f-2fb1-458a-8633-678bddefca16@googlegroups.com> Excuse me for the last post. The server works out of the box. Thanks! On Monday, June 25, 2012 1:18:29 AM UTC+2, Marcel Wijnen wrote: > > Hi Yaroslav, > > Since I'm trying to set nxweb up with ssl, I've configures with > "./configure --with-gnutls". The configuration seems to work (all tests are > ran and the configuration does not end with any failures). Then I make and > sudo make install. > > During this process I see that a key is generated and in the ssl folder I > think that the key and certificate are present > /nxweb-3.0.1-dev/ssl/ca.cfg > /nxweb-3.0.1-dev/ssl/ca_cert.pem > /nxweb-3.0.1-dev/ssl/ca_key.pem > /nxweb-3.0.1-dev/ssl/dh.pem > /nxweb-3.0.1-dev/ssl/Makefile > /nxweb-3.0.1-dev/ssl/Makefile.am > /nxweb-3.0.1-dev/ssl/Makefile.in > /nxweb-3.0.1-dev/ssl/server.cfg > /nxweb-3.0.1-dev/ssl/server_cert.pem > /nxweb-3.0.1-dev/ssl/server_key.pem > > When I run > *./nxweb > > *I get the following output and error message > *2012-06-25 01:07:00 [14276:0xb73788e0]: nxweb binding :8055 for http > 2012-06-25 01:07:00 [14276:0xb73788e0]: nxweb binding :8056 for https > 2012-06-25 01:07:00 [14276:0xb73788e0]: No certificate or key were found > * > Is there something trivial that I've forgotten to do here? Should I use > any flags or do some additional configuration? > > Could you help me out on this? Thanks in advance. > > Best, > Marcel > > > > On Sunday, April 1, 2012 9:11:46 PM UTC+2, Yaroslav wrote: >> >> Hi Nikos, >> >> That's good. Thank you very much for the reference. >> >> http://vincent.bernat.im/en/blog/2011-ssl-benchmark-round2.html >> Have you seen those benchmarks? There was no GnuTLS tested but now I >> think it could be. Do you happen to know the author? >> >> Yaroslav >> >> On Sun, Apr 1, 2012 at 10:26 PM, Nikos Mavrogiannopoulos wrote: >> >>> On 01/27/2012 08:52 PM, Yaroslav wrote: >>> >>> > I'd be happy if somene could do independent benchmarks of nxweb on >>> > different hardware. So that we know for sure that it is all true :) >>> >>> >>> Hello Yaroslav, >>> I've done benchmarks on a small system and pretty much verify your >>> results. I've put at: >>> >>> >>> http://nikmav.blogspot.com/2012/04/in-some-embedded-systems-space-may.html >>> >>> regards, >>> Nikos >>> >>> PS. I've modified httpress to print "rps" as floating point, because the >>> numbers were really small for this system. >>> >> >> -------------- next part -------------- An HTML attachment was scrubbed... URL: From INVALID.NOREPLY at gnu.org Tue Jun 26 03:37:01 2012 From: INVALID.NOREPLY at gnu.org (Lucas Fisher) Date: Tue, 26 Jun 2012 01:37:01 +0000 Subject: [sr #108078] [PATCH] Certtool exports multiple keys in PKCS12 file In-Reply-To: <20120624-213519.sv707.96176@savannah.gnu.org> References: <20120623-221755.sv88485.890@savannah.gnu.org> <20120624-213519.sv707.96176@savannah.gnu.org> Message-ID: <20120626-013701.sv88485.57899@savannah.gnu.org> Follow-up Comment #2, sr #108078 (project gnutls): Not a problem. I submitted the request to the FSF for assigning this and future contributions. _______________________________________________________ Reply to this item at: _______________________________________________ Message sent via/by Savannah http://savannah.gnu.org/