Bug#480041: confirmation that debian #480041 is a gnutls problem, and steps to reproduce

Joe Orton joe at manyfish.co.uk
Fri Nov 28 09:47:57 EST 2008


I've tried this using a git build of GnuTLS, gnutls-cli and a test 
httpd/mod_ssl server configured for per-location client cert auth (i.e. 
it requests a second handshake after the GET request is recevied), and 
it does fail, so I think this is indeed a GnuTLS bug in the handling of 
rehandshakes.

Attached:

1) gnutls-cli log output from testing using httpd/mod_ssl
2) patch to tests/x509self.c which attempts to replicate this test case
3) stdout and stderr output from running (2)



-------------- next part --------------
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: PSK_SHA_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: PSK_SHA_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: PSK_SHA_ARCFOUR_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
|<2>| EXT[0x1a7f3f0]: Sending extension CERT_TYPE
|<2>| EXT[0x1a7f3f0]: Sending extension SERVER_NAME
|<3>| HSK[0x1a7f3f0]: CLIENT HELLO was send [110 bytes]
|<6>| BUF[HSK]: Peeked 0 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<4>| REC[0x1a7f3f0]: Sending Packet[0] Handshake(22) with length: 110
|<2>| ASSERT: gnutls_cipher.c:204
|<7>| WRITE: Will write 115 bytes to 0x4.
|<7>| WRITE: wrote 115 bytes to 0x4. Left 0 bytes. Total 115 bytes.
|<7>| 0000 - 16 03 02 00 6e 01 00 00 6a 03 02 49 2f ff a3 b5 
|<7>| 0001 - c1 75 14 54 24 96 73 7c cb a3 d0 e5 fe 13 28 b9 
|<7>| 0002 - ed 7e 7a 6d 85 1b e5 33 bd 69 ac 00 00 28 00 33 
|<7>| 0003 - 00 39 00 16 00 32 00 38 00 13 00 66 00 90 00 91 
|<7>| 0004 - 00 8f 00 8e 00 2f 00 35 00 0a 00 05 00 04 00 8c 
|<7>| 0005 - 00 8d 00 8b 00 8a 01 00 00 19 00 09 00 03 02 00 
|<7>| 0006 - 01 00 00 00 0e 00 0c 00 00 09 6c 6f 63 61 6c 68 
|<7>| 0007 - 6f 73 74 
|<4>| REC[0x1a7f3f0]: Sent Packet[1] Handshake(22) with length: 115
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| 0000 - 16 03 01 00 30 
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x1a7f3f0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x1a7f3f0]: Received Packet[0] Handshake(22) with length: 48
|<7>| READ: Got 48 bytes from 0x4
|<7>| READ: read 48 bytes from 0x4
|<7>| 0000 - 02 00 00 2c 03 01 49 2f ff a3 45 b7 6d be 94 29 
|<7>| 0001 - c2 9e fa 89 30 5b 0d e0 2e 82 ed 49 80 1f 1a 3c 
|<7>| 0002 - f3 a7 d5 9b 9d d7 00 00 33 00 00 04 00 00 00 00 
|<7>| 0003 - 
|<7>| RB: Have 5 bytes into buffer. Adding 48 bytes.
|<7>| RB: Requested 53 bytes
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x1a7f3f0]: Decrypted Packet[0] Handshake(22) with length: 48
|<6>| BUF[HSK]: Inserted 48 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
|<3>| HSK[0x1a7f3f0]: SERVER HELLO was received [48 bytes]
|<6>| BUF[REC][HD]: Read 44 bytes of Data(22)
|<6>| BUF[HSK]: Peeked 0 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<6>| BUF[HSK]: Inserted 4 bytes of Data
|<6>| BUF[HSK]: Inserted 44 bytes of Data
|<3>| HSK[0x1a7f3f0]: Server's version: 3.1
|<3>| HSK[0x1a7f3f0]: SessionID length: 0
|<3>| HSK[0x1a7f3f0]: SessionID: 
|<3>| HSK[0x1a7f3f0]: Selected cipher suite: DHE_RSA_AES_128_CBC_SHA1
|<2>| EXT[0x1a7f3f0]: Received extension 'SERVER_NAME/0'
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| 0000 - 16 03 01 05 8a 
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x1a7f3f0]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x1a7f3f0]: Received Packet[1] Handshake(22) with length: 1418
|<7>| READ: Got 1418 bytes from 0x4
|<7>| READ: read 1418 bytes from 0x4
|<7>| 0000 - 0b 00 05 86 00 05 83 00 02 d8 30 82 02 d4 30 82 
|<7>| 0001 - 02 3d a0 03 02 01 02 02 01 0c 30 0d 06 09 2a 86 
|<7>| 0002 - 48 86 f7 0d 01 01 04 05 00 30 81 94 31 0b 30 09 
|<7>| 0003 - 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 
|<7>| 0004 - 04 08 13 0a 43 61 6c 69 66 6f 72 6e 69 61 31 16 
|<7>| 0005 - 30 14 06 03 55 04 07 13 0d 53 61 6e 20 46 72 61 
|<7>| 0006 - 6e 63 69 73 63 6f 31 0c 30 0a 06 03 55 04 0a 13 
|<7>| 0007 - 03 41 53 46 31 13 30 11 06 03 55 04 0b 13 0a 68 
|<7>| 0008 - 74 74 70 64 2d 74 65 73 74 31 0b 30 09 06 03 55 
|<7>| 0009 - 04 03 13 02 63 61 31 28 30 26 06 09 2a 86 48 86 
|<7>| 000a - f7 0d 01 09 01 16 19 74 65 73 74 2d 64 65 76 40 
|<7>| 000b - 68 74 74 70 64 2e 61 70 61 63 68 65 2e 6f 72 67 
|<7>| 000c - 30 1e 17 0d 30 38 31 31 32 37 32 32 35 30 31 34 
|<7>| 000d - 5a 17 0d 30 39 31 31 32 37 32 32 35 30 31 34 5a 
|<7>| 000e - 30 81 a4 31 0b 30 09 06 03 55 04 06 13 02 55 53 
|<7>| 000f - 31 13 30 11 06 03 55 04 08 13 0a 43 61 6c 69 66 
|<7>| 0010 - 6f 72 6e 69 61 31 16 30 14 06 03 55 04 07 13 0d 
|<7>| 0011 - 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 0c 30 
|<7>| 0012 - 0a 06 03 55 04 0a 13 03 41 53 46 31 1c 30 1a 06 
|<7>| 0013 - 03 55 04 0b 13 13 68 74 74 70 64 2d 74 65 73 74 
|<7>| 0014 - 2f 72 73 61 2d 74 65 73 74 31 12 30 10 06 03 55 
|<7>| 0015 - 04 03 13 09 6c 6f 63 61 6c 68 6f 73 74 31 28 30 
|<7>| 0016 - 26 06 09 2a 86 48 86 f7 0d 01 09 01 16 19 74 65 
|<7>| 0017 - 73 74 2d 64 65 76 40 68 74 74 70 64 2e 61 70 61 
|<7>| 0018 - 63 68 65 2e 6f 72 67 30 81 9f 30 0d 06 09 2a 86 
|<7>| 0019 - 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 
|<7>| 001a - 02 81 81 00 a9 b4 c6 02 23 44 76 3a 0d 8f 3c 30 
|<7>| 001b - 33 65 8b e8 e4 38 09 58 13 55 04 79 8c db 3f 0e 
|<7>| 001c - cf a6 d2 d1 c2 bb f0 01 6c 44 bf 40 f6 5f b1 0d 
|<7>| 001d - 33 01 d1 6d 2e 1f 80 77 82 6d d8 d6 5b 2b 57 6a 
|<7>| 001e - 8b 1d ab 50 f1 d3 a0 d2 13 5e 97 87 ed bc a3 35 
|<7>| 001f - 16 07 05 02 6c 73 c1 2b cd e9 ad e1 3e ed 0f 46 
|<7>| 0020 - 27 07 d3 fb a3 77 b8 6d 26 14 23 b0 43 65 00 e7 
|<7>| 0021 - da 93 e4 1f 11 03 e2 8b a3 da 99 b8 6e 5e 30 c6 
|<7>| 0022 - b3 06 82 89 02 03 01 00 01 a3 24 30 22 30 20 06 
|<7>| 0023 - 09 60 86 48 01 86 f8 42 01 0d 04 13 16 11 54 68 
|<7>| 0024 - 69 73 20 49 73 20 41 20 43 6f 6d 6d 65 6e 74 30 
|<7>| 0025 - 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 
|<7>| 0026 - 81 00 28 eb 82 ee 54 cf 10 cd 52 6b 65 85 a9 9c 
|<7>| 0027 - b0 03 5e 3c e6 c7 93 3a 2d 0b 32 b5 36 55 dc e8 
|<7>| 0028 - a3 2e 64 44 5e 8a 34 38 00 a8 01 91 c8 67 17 da 
|<7>| 0029 - 87 d9 50 89 a9 b0 b3 25 57 01 40 44 a9 49 31 2c 
|<7>| 002a - 94 71 3f 5e d1 21 91 59 af b2 1e 70 24 67 1c b8 
|<7>| 002b - 9d 9f 7d f9 a9 96 f6 71 28 39 5f e4 e4 7e 85 6d 
|<7>| 002c - a0 e6 93 dd c8 7a 4d 6d ed 42 1e 5c 2f f1 f1 7e 
|<7>| 002d - 12 ce 99 23 ae e4 6c 87 67 db b2 f7 1d 01 6a 69 
|<7>| 002e - e0 06 00 02 a5 30 82 02 a1 30 82 02 0a 02 09 00 
|<7>| 002f - d7 cd cc 48 ce dc da 75 30 0d 06 09 2a 86 48 86 
|<7>| 0030 - f7 0d 01 01 05 05 00 30 81 94 31 0b 30 09 06 03 
|<7>| 0031 - 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 
|<7>| 0032 - 13 0a 43 61 6c 69 66 6f 72 6e 69 61 31 16 30 14 
|<7>| 0033 - 06 03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 
|<7>| 0034 - 69 73 63 6f 31 0c 30 0a 06 03 55 04 0a 13 03 41 
|<7>| 0035 - 53 46 31 13 30 11 06 03 55 04 0b 13 0a 68 74 74 
|<7>| 0036 - 70 64 2d 74 65 73 74 31 0b 30 09 06 03 55 04 03 
|<7>| 0037 - 13 02 63 61 31 28 30 26 06 09 2a 86 48 86 f7 0d 
|<7>| 0038 - 01 09 01 16 19 74 65 73 74 2d 64 65 76 40 68 74 
|<7>| 0039 - 74 70 64 2e 61 70 61 63 68 65 2e 6f 72 67 30 1e 
|<7>| 003a - 17 0d 30 38 31 31 32 37 32 32 35 30 31 33 5a 17 
|<7>| 003b - 0d 30 39 31 31 32 37 32 32 35 30 31 33 5a 30 81 
|<7>| 003c - 94 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 
|<7>| 003d - 30 11 06 03 55 04 08 13 0a 43 61 6c 69 66 6f 72 
|<7>| 003e - 6e 69 61 31 16 30 14 06 03 55 04 07 13 0d 53 61 
|<7>| 003f - 6e 20 46 72 61 6e 63 69 73 63 6f 31 0c 30 0a 06 
|<7>| 0040 - 03 55 04 0a 13 03 41 53 46 31 13 30 11 06 03 55 
|<7>| 0041 - 04 0b 13 0a 68 74 74 70 64 2d 74 65 73 74 31 0b 
|<7>| 0042 - 30 09 06 03 55 04 03 13 02 63 61 31 28 30 26 06 
|<7>| 0043 - 09 2a 86 48 86 f7 0d 01 09 01 16 19 74 65 73 74 
|<7>| 0044 - 2d 64 65 76 40 68 74 74 70 64 2e 61 70 61 63 68 
|<7>| 0045 - 65 2e 6f 72 67 30 81 9f 30 0d 06 09 2a 86 48 86 
|<7>| 0046 - f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 
|<7>| 0047 - 81 00 cc b4 9c 64 b4 77 c2 45 3e 0c f7 33 fd b0 
|<7>| 0048 - e8 5f 19 a5 b9 6e 7f 7b fb eb da 6e be 26 f7 8d 
|<7>| 0049 - 9a d4 0b c4 49 cd 39 c3 77 47 a4 53 3a 2c 39 d1 
|<7>| 004a - 90 85 dd 97 d7 ff 3e 5e be b4 86 81 7b 00 2a 3f 
|<7>| 004b - 7e e7 b0 4a f7 f6 6d 40 44 dc 4f de 62 5b f7 d2 
|<7>| 004c - 4c a1 4b 3d 83 12 eb 84 ab 8c f6 5e 8a 5c 67 4e 
|<7>| 004d - 00 7b 80 d2 54 c8 13 5a 47 fe 58 a4 ac e8 6e d4 
|<7>| 004e - a3 ec 90 d8 8e 84 e8 b1 40 21 df 4a ca f8 35 4d 
|<7>| 004f - a2 49 02 03 01 00 01 30 0d 06 09 2a 86 48 86 f7 
|<7>| 0050 - 0d 01 01 05 05 00 03 81 81 00 5f d4 ca f5 98 86 
|<7>| 0051 - 1d d1 5e db d8 ec a6 8a 14 e3 c2 5f 1e ef 1d 10 
|<7>| 0052 - 15 ff b6 1e af 69 50 f4 0f 54 80 b3 1a 15 26 77 
|<7>| 0053 - 1d f9 ae 21 4d b3 1e b0 63 39 95 1d 30 5a 38 bd 
|<7>| 0054 - 7d 5b 6e bb bd f6 e3 b9 87 01 f4 b4 35 80 ad f9 
|<7>| 0055 - ae 07 14 57 2c 60 3b 39 92 a5 29 d4 e2 9c d1 78 
|<7>| 0056 - b8 cb a2 47 bb 59 30 c3 32 75 9c ab 1e c8 7f a9 
|<7>| 0057 - 19 d7 d8 41 ee 9b 2d 0a 4f 7f 7f 2c 11 9c 34 71 
|<7>| 0058 - 02 05 8d ab 32 81 ff 73 04 76 
|<7>| RB: Have 5 bytes into buffer. Adding 1418 bytes.
|<7>| RB: Requested 1423 bytes
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x1a7f3f0]: Decrypted Packet[1] Handshake(22) with length: 1418
|<6>| BUF[HSK]: Inserted 1418 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
|<3>| HSK[0x1a7f3f0]: CERTIFICATE was received [1418 bytes]
|<6>| BUF[REC][HD]: Read 1414 bytes of Data(22)
|<6>| BUF[HSK]: Peeked 48 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<6>| BUF[HSK]: Inserted 4 bytes of Data
|<6>| BUF[HSK]: Inserted 1414 bytes of Data
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| 0000 - 16 03 01 01 8d 
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x1a7f3f0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x1a7f3f0]: Received Packet[2] Handshake(22) with length: 397
|<7>| READ: Got 397 bytes from 0x4
|<7>| READ: read 397 bytes from 0x4
|<7>| 0000 - 0c 00 01 89 00 80 d6 7d e4 40 cb bb dc 19 36 d6 
|<7>| 0001 - 93 d3 4a fd 0a d5 0c 84 d2 39 a4 5f 52 0b b8 81 
|<7>| 0002 - 74 cb 98 bc e9 51 84 9f 91 2e 63 9c 72 fb 13 b4 
|<7>| 0003 - b4 d7 17 7e 16 d5 5a c1 79 ba 42 0b 2a 29 fe 32 
|<7>| 0004 - 4a 46 7a 63 5e 81 ff 59 01 37 7b ed dc fd 33 16 
|<7>| 0005 - 8a 46 1a ad 3b 72 da e8 86 00 78 04 5b 07 a7 db 
|<7>| 0006 - ca 78 74 08 7d 15 10 ea 9f cc 9d dd 33 05 07 dd 
|<7>| 0007 - 62 db 88 ae aa 74 7d e0 f4 d6 e2 bd 68 b0 e7 39 
|<7>| 0008 - 3e 0f 24 21 8e b3 00 01 02 00 80 56 2e 53 3c 20 
|<7>| 0009 - 46 75 af a7 f4 6c df 2d 00 5d 34 86 4a 20 a3 7a 
|<7>| 000a - 10 94 79 a6 b7 fc 1e 9c ee 47 f1 3a 23 9f 51 a7 
|<7>| 000b - 8d 60 f1 92 39 6f e4 c6 c5 b9 0a c3 bb ce 35 c1 
|<7>| 000c - f4 5c 79 c7 d7 3c 03 9c f5 51 16 fb 03 6a 3b 67 
|<7>| 000d - 88 16 f0 50 3b 0a 18 da 17 5e 28 d0 b1 5e 41 5a 
|<7>| 000e - c0 55 25 a7 23 08 34 37 ac 6e e6 7c 6d 78 cd 66 
|<7>| 000f - cc 7c b0 d0 9e d0 ef 5b b0 88 6f 57 d1 b9 92 4d 
|<7>| 0010 - e8 bd 3d cd 9a 2f 37 91 ef 15 1c 00 80 1d 58 f0 
|<7>| 0011 - e2 f4 78 a4 a5 32 2f 33 26 49 41 f2 07 67 25 fc 
|<7>| 0012 - 6d 0b 92 d4 83 b9 2c 33 7c f6 07 8e 84 01 15 7f 
|<7>| 0013 - 3d 9a 47 f4 98 82 1c 29 92 ca 8a 1c 00 93 82 90 
|<7>| 0014 - b1 e2 bb 47 05 e3 14 94 22 80 97 2f 58 9f 97 c8 
|<7>| 0015 - c3 70 4a b4 69 7f 73 8a 30 74 71 5b 0d eb 71 c7 
|<7>| 0016 - 1f f5 d3 ec b8 66 ac 9d a2 f1 37 f5 d3 a7 0c d0 
|<7>| 0017 - ee 22 0a aa 50 22 48 ce 44 c5 a1 cf e9 27 89 76 
|<7>| 0018 - 22 c7 c8 43 8d ad f5 cd 52 17 3e 84 81 
|<7>| RB: Have 5 bytes into buffer. Adding 397 bytes.
|<7>| RB: Requested 402 bytes
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x1a7f3f0]: Decrypted Packet[2] Handshake(22) with length: 397
|<6>| BUF[HSK]: Inserted 397 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
|<3>| HSK[0x1a7f3f0]: SERVER KEY EXCHANGE was received [397 bytes]
|<6>| BUF[REC][HD]: Read 393 bytes of Data(22)
|<6>| BUF[HSK]: Peeked 1418 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<6>| BUF[HSK]: Inserted 4 bytes of Data
|<6>| BUF[HSK]: Inserted 393 bytes of Data
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| 0000 - 16 03 01 00 04 
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x1a7f3f0]: Expected Packet[3] Handshake(22) with length: 1
|<4>| REC[0x1a7f3f0]: Received Packet[3] Handshake(22) with length: 4
|<7>| READ: Got 4 bytes from 0x4
|<7>| READ: read 4 bytes from 0x4
|<7>| 0000 - 0e 00 00 00 
|<7>| RB: Have 5 bytes into buffer. Adding 4 bytes.
|<7>| RB: Requested 9 bytes
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x1a7f3f0]: Decrypted Packet[3] Handshake(22) with length: 4
|<6>| BUF[HSK]: Inserted 4 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
|<3>| HSK[0x1a7f3f0]: SERVER HELLO DONE was received [4 bytes]
|<2>| ASSERT: gnutls_handshake.c:1123
|<6>| BUF[HSK]: Peeked 397 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<6>| BUF[HSK]: Inserted 4 bytes of Data
|<3>| HSK[0x1a7f3f0]: CLIENT KEY EXCHANGE was send [134 bytes]
|<6>| BUF[HSK]: Peeked 4 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<4>| REC[0x1a7f3f0]: Sending Packet[1] Handshake(22) with length: 134
|<2>| ASSERT: gnutls_cipher.c:204
|<7>| WRITE: Will write 139 bytes to 0x4.
|<7>| WRITE: wrote 139 bytes to 0x4. Left 0 bytes. Total 139 bytes.
|<7>| 0000 - 16 03 01 00 86 10 00 00 82 00 80 d5 36 64 fa 6d 
|<7>| 0001 - f7 78 17 33 91 11 6e 23 e3 50 66 6f bb fc 31 0d 
|<7>| 0002 - 05 2f 54 30 ee a7 e2 b5 6f e8 d9 30 b4 e0 13 7d 
|<7>| 0003 - a1 23 92 f1 a4 1e 36 d6 dd c7 2e 4f fa 48 62 52 
|<7>| 0004 - 7c 5e e6 93 94 72 8f c1 8d 29 c3 73 68 69 a1 0d 
|<7>| 0005 - 4f 27 a3 31 25 11 41 24 6c 9d dd e3 e4 63 da ca 
|<7>| 0006 - c7 84 f7 d2 e9 d5 3e fa 2d 71 14 fa 4a fd 01 78 
|<7>| 0007 - 48 d1 58 39 89 e9 58 c7 92 d8 fe 98 78 ee 30 0f 
|<7>| 0008 - f6 b2 20 e6 e6 4b f2 c7 f1 47 29 
|<4>| REC[0x1a7f3f0]: Sent Packet[2] Handshake(22) with length: 139
|<3>| REC[0x1a7f3f0]: Sent ChangeCipherSpec
|<4>| REC[0x1a7f3f0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
|<2>| ASSERT: gnutls_cipher.c:204
|<7>| WRITE: Will write 6 bytes to 0x4.
|<7>| WRITE: wrote 6 bytes to 0x4. Left 0 bytes. Total 6 bytes.
|<7>| 0000 - 14 03 01 00 01 01 
|<4>| REC[0x1a7f3f0]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<9>| INT: PREMASTER SECRET[128]: ad5b4dcc554166127f6ed0774508a9895c173a4ff7b32f5f4420ebafbafdfbc54d4cf91da109517384e43f2583ac0733c3771b6f6abf9739ca79ea6fed83a8f8f68b1881608d962507bc970986be0671239749283fb2dc1d703b4b469cb8cf0adcc855e289f588aa9f1996fb0e35e82666ff0e0484e81de5b3abb2342cd87738
|<9>| INT: CLIENT RANDOM[32]: 492fffa3b5c17514542496737ccba3d0e5fe1328b9ed7e7a6d851be533bd69ac
|<9>| INT: SERVER RANDOM[32]: 492fffa345b76dbe9429c29efa89305b0de02e82ed49801f1a3cf3a7d59b9dd7
|<9>| INT: MASTER SECRET: dc9df9bc5622829bd321ffbc08e646b14472c80c365615e35c24d74082ef6b2d0a35885d8bee7b64713c01cbd16acdd8
|<9>| INT: KEY BLOCK[104]: ee560f34974df91ba849d166c688ba95ea4287cf7402c083cc7570e0d377058e
|<9>| INT: CLIENT WRITE KEY [16]: aa6380640d573eec02bdb4b2a8b11d29
|<9>| INT: SERVER WRITE KEY [16]: 467acf0753496c8cb5e700f1071a3633
|<3>| HSK[0x1a7f3f0]: Cipher Suite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Initializing internal [write] cipher sessions
|<6>| BUF[HSK]: Peeked 0 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<3>| HSK[0x1a7f3f0]: FINISHED was send [16 bytes]
|<6>| BUF[HSK]: Peeked 0 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<4>| REC[0x1a7f3f0]: Sending Packet[0] Handshake(22) with length: 16
|<7>| WRITE: Will write 181 bytes to 0x4.
|<7>| WRITE: wrote 181 bytes to 0x4. Left 0 bytes. Total 181 bytes.
|<7>| 0000 - 16 03 01 00 b0 98 4d db bd bc 2f ff ff b7 b5 4e 
|<7>| 0001 - 7b 0b 79 ac 0e 5b ae 78 2f bd 1d c6 ad 10 7b 7d 
|<7>| 0002 - 71 0d 15 19 7e fa 2e f6 74 3e 48 3f 4a e2 23 c6 
|<7>| 0003 - 55 12 77 50 88 1c 3a ef 7c 90 00 c3 d1 da 23 2d 
|<7>| 0004 - 99 1f 8f 33 5d ab 3e 4d c3 6e ad cf 1a 53 bb cb 
|<7>| 0005 - 15 75 02 39 e9 6f 19 0f 3f 40 ff cd 58 b7 47 9b 
|<7>| 0006 - b5 1a 52 02 c1 1b 52 6f 64 ad 38 45 9c ab 8f 3b 
|<7>| 0007 - 25 27 f7 72 c4 70 dd ce e5 46 40 fa a2 37 76 60 
|<7>| 0008 - 65 46 cb 8a 84 b6 73 ea 51 f9 78 f1 7b 98 d1 d9 
|<7>| 0009 - d6 00 60 ef 25 05 de 86 56 20 7f 08 e3 1e 5a 72 
|<7>| 000a - 62 bb 0d ee 62 33 c0 a8 d8 3c c9 ae a7 d7 51 9c 
|<7>| 000b - b0 60 7d c8 0a 
|<4>| REC[0x1a7f3f0]: Sent Packet[1] Handshake(22) with length: 181
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| 0000 - 14 03 01 00 01 
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x1a7f3f0]: Expected Packet[4] Change Cipher Spec(20) with length: 1
|<4>| REC[0x1a7f3f0]: Received Packet[4] Change Cipher Spec(20) with length: 1
|<7>| READ: Got 1 bytes from 0x4
|<7>| READ: read 1 bytes from 0x4
|<7>| 0000 - 01 
|<7>| RB: Have 5 bytes into buffer. Adding 1 bytes.
|<7>| RB: Requested 6 bytes
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x1a7f3f0]: ChangeCipherSpec Packet was received
|<3>| HSK[0x1a7f3f0]: Cipher Suite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Initializing internal [read] cipher sessions
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| 0000 - 16 03 01 00 30 
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x1a7f3f0]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x1a7f3f0]: Received Packet[0] Handshake(22) with length: 48
|<7>| READ: Got 48 bytes from 0x4
|<7>| READ: read 48 bytes from 0x4
|<7>| 0000 - 14 66 39 d1 76 a0 e9 b5 89 5d 7d 1e 75 0d 2b fa 
|<7>| 0001 - b0 34 74 6e 06 00 65 24 3d 59 20 25 51 45 bc 1c 
|<7>| 0002 - bd 84 82 ae 61 50 3f ae c4 e3 18 13 dd 7b 08 73 
|<7>| 0003 - 
|<7>| RB: Have 5 bytes into buffer. Adding 48 bytes.
|<7>| RB: Requested 53 bytes
|<4>| REC[0x1a7f3f0]: Decrypted Packet[0] Handshake(22) with length: 16
|<6>| BUF[HSK]: Inserted 16 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
|<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
|<3>| HSK[0x1a7f3f0]: FINISHED was received [16 bytes]
|<6>| BUF[REC][HD]: Read 12 bytes of Data(22)
|<6>| BUF[HSK]: Peeked 0 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<6>| BUF[HSK]: Inserted 4 bytes of Data
|<6>| BUF[HSK]: Inserted 12 bytes of Data
|<6>| BUF[HSK]: Cleared Data from buffer
|<2>| ASSERT: ext_server_name.c:257
|<2>| ASSERT: verify.c:237
|<2>| ASSERT: verify.c:393
|<4>| REC[0x1a7f3f0]: Sending Packet[1] Application Data(23) with length: 21
|<7>| WRITE: Will write 101 bytes to 0x4.
|<7>| WRITE: wrote 101 bytes to 0x4. Left 0 bytes. Total 101 bytes.
|<7>| 0000 - 17 03 01 00 60 94 f8 fc 86 50 0c d3 ef 7d 02 4d 
|<7>| 0001 - 8e 8b ec b6 cf 6f 10 01 94 ce 61 f8 f3 ea 8b fc 
|<7>| 0002 - a6 3d de c5 b4 45 47 73 3b af ed c8 d1 c7 88 83 
|<7>| 0003 - 52 56 54 c4 95 4f 65 74 cf b1 5e 10 0d d7 2a 27 
|<7>| 0004 - 99 63 cb 10 32 95 bc 13 41 64 1a 17 20 3d fd 50 
|<7>| 0005 - bc 98 51 c8 97 78 67 ee d7 22 e4 d5 05 1d de a3 
|<7>| 0006 - 98 cd 9f cd 4e 
|<4>| REC[0x1a7f3f0]: Sent Packet[2] Application Data(23) with length: 101
|<4>| REC[0x1a7f3f0]: Sending Packet[2] Application Data(23) with length: 16
|<7>| WRITE: Will write 69 bytes to 0x4.
|<7>| WRITE: wrote 69 bytes to 0x4. Left 0 bytes. Total 69 bytes.
|<7>| 0000 - 17 03 01 00 40 ef fc a4 88 37 8a 7a b5 80 a1 b7 
|<7>| 0001 - d0 4d 11 56 f7 9a 67 39 43 a4 94 86 7b e4 35 75 
|<7>| 0002 - ca 0f 39 07 24 76 c0 fc 9c bb 8f 27 3d 3e 75 2f 
|<7>| 0003 - 5a 85 25 38 f9 a3 51 39 3d 9e 18 b5 26 52 9b 43 
|<7>| 0004 - e7 43 a0 42 24 
|<4>| REC[0x1a7f3f0]: Sent Packet[3] Application Data(23) with length: 69
|<4>| REC[0x1a7f3f0]: Sending Packet[3] Application Data(23) with length: 1
|<7>| WRITE: Will write 245 bytes to 0x4.
|<7>| WRITE: wrote 245 bytes to 0x4. Left 0 bytes. Total 245 bytes.
|<7>| 0000 - 17 03 01 00 f0 4e 98 84 fd ee a2 36 4d c4 ab da 
|<7>| 0001 - 6f 13 11 90 f6 cb 0a 2b b0 08 42 ae 79 ed 76 a7 
|<7>| 0002 - 29 21 1f bc ff 78 87 f4 6b de 9d ea 9b 0f d4 c2 
|<7>| 0003 - d5 56 ac b3 70 34 17 13 91 e1 2b b6 08 5a 44 7b 
|<7>| 0004 - 6a 1e 05 aa b7 6c 15 66 50 f6 41 63 3e 3d cc 5f 
|<7>| 0005 - cc 3e 2b f3 7d a0 78 7c 93 4c 5b e6 b9 31 72 f9 
|<7>| 0006 - 1a c7 fc 4d 95 60 71 1e aa 12 63 16 39 44 1a 96 
|<7>| 0007 - 8c 24 79 0c 3a 1f 60 c2 09 71 4a a5 56 f1 09 8c 
|<7>| 0008 - 06 1a b2 34 e2 60 8d 3e e9 ba d9 73 e4 0e 5e 79 
|<7>| 0009 - 3d b5 18 0f 30 f3 76 56 b1 d5 7c 5f 20 35 a8 1b 
|<7>| 000a - 13 ed 8b aa 76 3c d7 8b 24 36 b3 78 68 bd bf 73 
|<7>| 000b - 34 30 c5 2a f1 47 3b e6 1a 09 ee 4d 2a 3b 81 a7 
|<7>| 000c - 77 36 1e 71 39 11 7f e5 aa 53 a2 1e ff 4b 03 7c 
|<7>| 000d - e1 85 56 50 f6 79 ec 2b 36 75 9d 62 26 d6 10 22 
|<7>| 000e - 27 3c 07 9d 9a 15 be bd 6d 2c 73 af 49 fb 93 48 
|<7>| 000f - 79 5c 74 e5 9a 
|<4>| REC[0x1a7f3f0]: Sent Packet[4] Application Data(23) with length: 245
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| 0000 - 16 03 01 00 20 
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x1a7f3f0]: Expected Packet[1] Application Data(23) with length: 4096
|<4>| REC[0x1a7f3f0]: Received Packet[1] Handshake(22) with length: 32
|<7>| READ: Got 32 bytes from 0x4
|<7>| READ: read 32 bytes from 0x4
|<7>| 0000 - 79 58 5e 0d a9 69 5e 0c 9f ea e2 a5 51 b8 7d 7a 
|<7>| 0001 - 47 45 f0 2b a9 0c 5e 55 10 31 73 9f ed 7e ae 8b 
|<7>| 0002 - 
|<7>| RB: Have 5 bytes into buffer. Adding 32 bytes.
|<7>| RB: Requested 37 bytes
|<4>| REC[0x1a7f3f0]: Decrypted Packet[1] Handshake(22) with length: 4
|<2>| ASSERT: gnutls_record.c:1048
*** Non fatal error: Rehandshake was requested by the peer.
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: PSK_SHA_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: PSK_SHA_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Keeping ciphersuite: PSK_SHA_ARCFOUR_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
|<3>| HSK[0x1a7f3f0]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
|<2>| EXT[0x1a7f3f0]: Sending extension CERT_TYPE
|<2>| EXT[0x1a7f3f0]: Sending extension SERVER_NAME
|<3>| HSK[0x1a7f3f0]: CLIENT HELLO was send [110 bytes]
|<6>| BUF[HSK]: Peeked 0 bytes of Data
|<6>| BUF[HSK]: Emptied buffer
|<4>| REC[0x1a7f3f0]: Sending Packet[4] Handshake(22) with length: 110
|<7>| WRITE: Will write 261 bytes to 0x4.
|<7>| WRITE: wrote 261 bytes to 0x4. Left 0 bytes. Total 261 bytes.
|<7>| 0000 - 16 03 02 01 00 0f b0 1b 6c 7b 1c 5b 26 d6 30 f2 
|<7>| 0001 - ff 0b 5f ba 8b 3f 7e 38 9a 3b a1 0d 89 a7 6f f2 
|<7>| 0002 - 22 53 a3 b3 46 4e cb 48 47 86 eb a6 b8 d9 c9 bc 
|<7>| 0003 - 64 9d b9 e0 c1 dd de 35 16 96 6a 9c c8 cc 2a 1b 
|<7>| 0004 - ef dd dd 61 92 27 0b 74 57 fe b9 ac f9 dd c5 f5 
|<7>| 0005 - 52 06 74 31 7e 0a b9 60 66 bc 6b 40 18 72 8a 6c 
|<7>| 0006 - 62 5f a2 dc de cd 94 66 99 44 a1 c1 06 36 bf a9 
|<7>| 0007 - 7e 4d e5 5d 93 4f 49 4c 84 96 ab b9 00 df d7 3c 
|<7>| 0008 - f1 36 39 9d e0 46 d9 fa ed fc f9 89 53 6c 16 d2 
|<7>| 0009 - bd 91 35 6b 58 6a 2c 19 53 3e 98 43 a9 ee da f5 
|<7>| 000a - 98 79 58 6d 8f 72 25 ee b0 ff 72 b2 ee 5e ef 57 
|<7>| 000b - bb e3 a3 a5 ec e1 34 55 a5 d6 7c 77 a8 37 ab 97 
|<7>| 000c - 5e 69 ce 48 58 09 4c 35 6b a9 cb 8e 04 e3 07 f1 
|<7>| 000d - ab 40 ae 6e ae d8 67 06 43 f8 99 06 e6 ea 21 9d 
|<7>| 000e - af 90 09 a6 23 b3 75 21 dc c1 f8 b3 c6 c3 85 c0 
|<7>| 000f - c6 b5 a1 1c be 00 1e ef 55 0f e4 42 0a 9a f0 06 
|<7>| 0010 - f2 94 3d 11 c0 
|<4>| REC[0x1a7f3f0]: Sent Packet[5] Handshake(22) with length: 261
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| 0000 - 15 03 01 00 20 
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x1a7f3f0]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x1a7f3f0]: Received Packet[2] Alert(21) with length: 32
|<7>| READ: Got 32 bytes from 0x4
|<7>| READ: read 32 bytes from 0x4
|<7>| 0000 - 78 a3 6b a4 e7 16 c2 d4 6e 9f e6 c1 a1 a6 9b 89 
|<7>| 0001 - 1d 7e ce d5 13 1e f5 5c 04 46 b6 bb 64 30 c1 76 
|<7>| 0002 - 
|<7>| RB: Have 5 bytes into buffer. Adding 32 bytes.
|<7>| RB: Requested 37 bytes
|<2>| ASSERT: gnutls_cipher.c:516
|<4>| REC[0x1a7f3f0]: Short record length 10 > 16 - 20 (under attack?)
|<2>| ASSERT: gnutls_record.c:1002
|<2>| ASSERT: gnutls_buffers.c:1030
|<2>| ASSERT: gnutls_handshake.c:1045
|<2>| ASSERT: gnutls_handshake.c:2346
|<6>| BUF[HSK]: Cleared Data from buffer
*** Fatal error: Decryption has failed.
|<2>| ASSERT: gnutls_record.c:879
*** Fatal error: The specified session has been invalidated for some reason.
*** Server has terminated the connection abnormally.
random usage: poolsize=600 mixed=28 polls=25/68 added=368/14980
              outmix=3 getlvl1=3/137 getlvl2=0/0
-------------- next part --------------
diff --git a/tests/x509self.c b/tests/x509self.c
index fd95190..180bfd7 100644
--- a/tests/x509self.c
+++ b/tests/x509self.c
@@ -166,9 +166,38 @@ client (void)
   /* see the Getting peer's information example */
   print_info (session);
 
-  gnutls_record_send (session, MSG, strlen (MSG));
+  ret = gnutls_record_send (session, MSG, strlen (MSG));
+  
+  if (ret == strlen(MSG))
+    {
+      success ("client: sent record.\n");
+    }
+  else 
+    {
+      fail ("client: failed to send record.\n");
+      gnutls_perror(ret);
+      goto end;
+    }
 
   ret = gnutls_record_recv (session, buffer, MAX_BUF);
+
+  success ("client: recv returned %d.\n", ret);
+
+  if (ret == GNUTLS_E_REHANDSHAKE)
+    {
+      success ("client: doing handshake!\n");
+      ret = gnutls_handshake (session);
+      if (ret == 0) 
+        {
+          success ("client: handshake complete, reading again.\n");
+          ret = gnutls_record_recv (session, buffer, MAX_BUF);
+        }
+      else
+        {
+          fail ("client: handshake failed.\n");
+        }
+  }
+
   if (ret == 0)
     {
       success ("client: Peer has closed the TLS connection\n");
@@ -227,7 +256,7 @@ initialize_tls_session (void)
 
   /* request client certificate if any.
    */
-  gnutls_certificate_server_set_request (session, GNUTLS_CERT_REQUEST);
+//  gnutls_certificate_server_set_request (session, GNUTLS_CERT_REQUEST);
 
   gnutls_dh_set_prime_bits (session, DH_BITS);
 
@@ -408,6 +437,20 @@ server (void)
 	}
       else if (ret > 0)
 	{
+          gnutls_certificate_server_set_request (session, GNUTLS_CERT_REQUEST);
+
+          success ("server: got data, forcing rehandshake.\n");
+
+          ret = gnutls_rehandshake(session);
+          if (ret < 0) 
+            {
+              fail ("server: rehandshake failed\n");
+              gnutls_perror(ret);
+              break;
+            }
+            
+          success ("server: rehandshake complete.\n");
+
 	  /* echo data back to the client
 	   */
 	  gnutls_record_send (session, buffer, strlen (buffer));
-------------- next part --------------
server: ready. Listening to port '5556'.
client: Handshake was completed
client: TLS version is: TLS1.1
- Key Exchange: DHE-RSA

- Ephemeral DH using prime of 1032 bits
Peer provided 1 certificates.
Certificate info:
	Certificate is valid since: Wed Apr 18 14:29:21 2007
	Certificate expires: Thu Apr 17 14:29:21 2008
	Certificate serial number: 46261d31 
Certificate public key: RSA	Certificate version: #3
	DN: O=GnuTLS test server,CN=test.gnutls.org
	Issuer's DN: CN=GnuTLS test CA
- Protocol: TLS1.1
- Certificate Type: X.509
- Compression: NULL
- Cipher: AES-128-CBC
- MAC: SHA1
client: sent record.
client: recv returned -37.
client: doing handshake!
Self test `./x509self' finished with 2 errors
server: ready. Listening to port '5556'.
Launched, generating DH parameters...
server: connection from 127.0.0.1, port 42192
server: Handshake was completed
server: TLS version is: TLS1.1
- Key Exchange: DHE-RSA

- Ephemeral DH using prime of 1032 bits
Peer provided 0 certificates.
- Protocol: TLS1.1
- Certificate Type: X.509
- Compression: NULL
- Cipher: AES-128-CBC
- MAC: SHA1
server: got data, forcing rehandshake.
server: rehandshake complete.
server: finished
Self test `./x509self' finished with 1 errors
-------------- next part --------------
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: PSK_SHA_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: PSK_SHA_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: PSK_SHA_ARCFOUR_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
client |<2>| EXT[0x11a0ed0]: Sending extension CERT_TYPE
client |<3>| HSK[0x11a0ed0]: CLIENT HELLO was send [76 bytes]
client |<6>| BUF[HSK]: Peeked 0 bytes of Data
client |<6>| BUF[HSK]: Emptied buffer
client |<4>| REC[0x11a0ed0]: Sending Packet[0] Handshake(22) with length: 76
client |<2>| ASSERT: gnutls_cipher.c:204
client |<7>| WRITE: Will write 81 bytes to 0x5.
client |<7>| WRITE: wrote 81 bytes to 0x5. Left 0 bytes. Total 81 bytes.
client |<7>| 0000 - 16 03 02 00 4c 01 00 00 48 03 02 49 30 03 f0 7c 
client |<7>| 0001 - b0 a9 6f f6 f6 4d 34 a0 77 5a 8f e1 6e 82 07 e1 
client |<7>| 0002 - d4 99 37 90 94 be 7d 54 a4 d6 53 00 00 18 00 33 
client |<7>| 0003 - 00 39 00 16 00 32 00 38 00 13 00 66 00 2f 00 35 
client |<7>| 0004 - 00 0a 00 05 00 04 01 00 00 07 00 09 00 03 02 00 
client |<7>| 0005 - 01 
client |<4>| REC[0x11a0ed0]: Sent Packet[1] Handshake(22) with length: 81
server |<7>| READ: Got 5 bytes from 0x5
server |<7>| READ: read 5 bytes from 0x5
server |<7>| 0000 - 16 03 02 00 4c 
server |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
server |<7>| RB: Requested 5 bytes
server |<4>| REC[0x11a3a20]: Expected Packet[0] Handshake(22) with length: 1
server |<4>| REC[0x11a3a20]: Received Packet[0] Handshake(22) with length: 76
server |<7>| READ: Got 76 bytes from 0x5
server |<7>| READ: read 76 bytes from 0x5
server |<7>| 0000 - 01 00 00 48 03 02 49 30 03 f0 7c b0 a9 6f f6 f6 
server |<7>| 0001 - 4d 34 a0 77 5a 8f e1 6e 82 07 e1 d4 99 37 90 94 
server |<7>| 0002 - be 7d 54 a4 d6 53 00 00 18 00 33 00 39 00 16 00 
server |<7>| 0003 - 32 00 38 00 13 00 66 00 2f 00 35 00 0a 00 05 00 
server |<7>| 0004 - 04 01 00 00 07 00 09 00 03 02 00 01 
server |<7>| RB: Have 5 bytes into buffer. Adding 76 bytes.
server |<7>| RB: Requested 81 bytes
server |<2>| ASSERT: gnutls_cipher.c:204
server |<4>| REC[0x11a3a20]: Decrypted Packet[0] Handshake(22) with length: 76
server |<6>| BUF[HSK]: Inserted 76 bytes of Data(22)
server |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
server |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
server |<3>| HSK[0x11a3a20]: CLIENT HELLO was received [76 bytes]
server |<6>| BUF[REC][HD]: Read 72 bytes of Data(22)
server |<6>| BUF[HSK]: Peeked 0 bytes of Data
server |<6>| BUF[HSK]: Emptied buffer
server |<6>| BUF[HSK]: Inserted 4 bytes of Data
server |<6>| BUF[HSK]: Inserted 72 bytes of Data
server |<3>| HSK[0x11a3a20]: Client's version: 3.2
server |<2>| ASSERT: gnutls_db.c:238
server |<2>| EXT[0x11a3a20]: Received extension 'CERT_TYPE/9'
server |<2>| EXT[0x11a3a20]: Received extension 'CERT_TYPE/9'
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: PSK_SHA_ARCFOUR_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: PSK_SHA_AES_128_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: PSK_SHA_AES_256_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: DHE_DSS_ARCFOUR_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
server |<3>| HSK[0x11a3a20]: Keeping ciphersuite: RSA_ARCFOUR_MD5
server |<3>| HSK[0x11a3a20]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Selected cipher suite: DHE_RSA_AES_128_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Selected Compression Method: NULL
server |<3>| HSK[0x11a3a20]: SessionID: 2fa2d3b6026d8762b0743b76ff5a475aefb9e98773a796078ae31431c078eaa5
server |<3>| HSK[0x11a3a20]: SERVER HELLO was send [74 bytes]
server |<6>| BUF[HSK]: Peeked 76 bytes of Data
server |<6>| BUF[HSK]: Emptied buffer
server |<4>| REC[0x11a3a20]: Sending Packet[0] Handshake(22) with length: 74
server |<2>| ASSERT: gnutls_cipher.c:204
server |<7>| WRITE: Will write 79 bytes to 0x5.
server |<7>| WRITE: wrote 79 bytes to 0x5. Left 0 bytes. Total 79 bytes.
server |<7>| 0000 - 16 03 02 00 4a 02 00 00 46 03 02 49 30 03 f0 68 
server |<7>| 0001 - cb 07 32 98 35 4d 10 b6 a9 2c 28 db d3 91 f7 9b 
server |<7>| 0002 - 98 7a d0 8b 84 9b e0 4d 81 ed 7e 20 2f a2 d3 b6 
server |<7>| 0003 - 02 6d 87 62 b0 74 3b 76 ff 5a 47 5a ef b9 e9 87 
server |<7>| 0004 - 73 a7 96 07 8a e3 14 31 c0 78 ea a5 00 33 00 
server |<4>| REC[0x11a3a20]: Sent Packet[1] Handshake(22) with length: 79
server |<3>| HSK[0x11a3a20]: CERTIFICATE was send [612 bytes]
server |<6>| BUF[HSK]: Peeked 0 bytes of Data
server |<6>| BUF[HSK]: Emptied buffer
server |<4>| REC[0x11a3a20]: Sending Packet[1] Handshake(22) with length: 612
server |<2>| ASSERT: gnutls_cipher.c:204
server |<7>| WRITE: Will write 617 bytes to 0x5.
server |<7>| WRITE: wrote 617 bytes to 0x5. Left 0 bytes. Total 617 bytes.
server |<7>| 0000 - 16 03 02 02 64 0b 00 02 60 00 02 5d 00 02 5a 30 
server |<7>| 0001 - 82 02 56 30 82 01 c1 a0 03 02 01 02 02 04 46 26 
server |<7>| 0002 - 1d 31 30 0b 06 09 2a 86 48 86 f7 0d 01 01 05 30 
server |<7>| 0003 - 19 31 17 30 15 06 03 55 04 03 13 0e 47 6e 75 54 
server |<7>| 0004 - 4c 53 20 74 65 73 74 20 43 41 30 1e 17 0d 30 37 
server |<7>| 0005 - 30 34 31 38 31 33 32 39 32 31 5a 17 0d 30 38 30 
server |<7>| 0006 - 34 31 37 31 33 32 39 32 31 5a 30 37 31 1b 30 19 
server |<7>| 0007 - 06 03 55 04 0a 13 12 47 6e 75 54 4c 53 20 74 65 
server |<7>| 0008 - 73 74 20 73 65 72 76 65 72 31 18 30 16 06 03 55 
server |<7>| 0009 - 04 03 13 0f 74 65 73 74 2e 67 6e 75 74 6c 73 2e 
server |<7>| 000a - 6f 72 67 30 81 9c 30 0b 06 09 2a 86 48 86 f7 0d 
server |<7>| 000b - 01 01 01 03 81 8c 00 30 81 88 02 81 80 d7 ba 5c 
server |<7>| 000c - af a3 0c f0 2e a9 27 56 aa 53 8e a8 eb 7f 81 75 
server |<7>| 000d - 4c 6b 98 be 4a ea b7 1e f8 4b c3 6a c4 da 0d 00 
server |<7>| 000e - b8 ea 4c 13 1f 36 16 93 de 72 ef c6 a4 5e b2 6e 
server |<7>| 000f - b6 ca 0a 88 55 75 90 96 ed a6 57 bc 0c 3b 76 0d 
server |<7>| 0010 - 97 1e bd e9 ec 7f d3 a9 ec fb 85 64 a0 6b a0 48 
server |<7>| 0011 - ce 77 7e 73 9c 31 13 ff 3d c8 ae a5 60 6e d9 b6 
server |<7>| 0012 - 8c 5a 9a 6f b6 be 9f 6a bd a7 f0 a0 33 27 f5 b7 
server |<7>| 0013 - 1d 92 e5 96 9c 73 52 d6 9f d6 c8 8e b1 02 03 01 
server |<7>| 0014 - 00 01 a3 81 93 30 81 90 30 0c 06 03 55 1d 13 01 
server |<7>| 0015 - 01 ff 04 02 30 00 30 1a 06 03 55 1d 11 04 13 30 
server |<7>| 0016 - 11 82 0f 74 65 73 74 2e 67 6e 75 74 6c 73 2e 6f 
server |<7>| 0017 - 72 67 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 
server |<7>| 0018 - 06 01 05 05 07 03 01 30 0f 06 03 55 1d 0f 01 01 
server |<7>| 0019 - ff 04 05 03 03 07 a0 00 30 1d 06 03 55 1d 0e 04 
server |<7>| 001a - 16 04 14 eb c7 45 6e e5 f8 25 ca 8c 8d 83 0d 74 
server |<7>| 001b - e9 86 d4 dd 55 b4 75 30 1f 06 03 55 1d 23 04 18 
server |<7>| 001c - 30 16 80 14 e9 3c 1c fb ad 92 6e e6 06 a4 56 2c 
server |<7>| 001d - a2 e1 c0 53 27 c8 f2 95 30 0b 06 09 2a 86 48 86 
server |<7>| 001e - f7 0d 01 01 05 03 81 81 00 68 51 0f 4e df bb 6f 
server |<7>| 001f - 3b c1 b8 e7 fb f9 09 9e 41 c9 f6 f6 44 fa 06 cc 
server |<7>| 0020 - a1 d5 11 c9 5d ff 0a 4e 4e 50 45 fc 29 ea 88 1b 
server |<7>| 0021 - a7 de 09 41 67 0d 43 f4 bb 60 31 47 82 50 f5 03 
server |<7>| 0022 - 05 0d 05 15 f0 77 7a e2 52 c3 27 b3 18 1e 48 3c 
server |<7>| 0023 - 58 05 f2 58 6c 32 de a2 13 41 b2 a6 8f 0c 96 fb 
server |<7>| 0024 - 5d a8 a5 59 b3 10 29 f0 1b 15 0f 1c 9c ec 60 ac 
server |<7>| 0025 - e2 8b 51 04 56 27 42 b7 1f 25 d1 32 16 ea 8d d2 
server |<7>| 0026 - c8 69 08 82 bd 02 ee 8b 3a 
server |<4>| REC[0x11a3a20]: Sent Packet[2] Handshake(22) with length: 617
client |<7>| READ: Got 5 bytes from 0x5
client |<7>| READ: read 5 bytes from 0x5
client |<7>| 0000 - 16 03 02 00 4a 
client |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
client |<7>| RB: Requested 5 bytes
client |<4>| REC[0x11a0ed0]: Expected Packet[0] Handshake(22) with length: 1
client |<4>| REC[0x11a0ed0]: Received Packet[0] Handshake(22) with length: 74
client |<7>| READ: Got 74 bytes from 0x5
client |<7>| READ: read 74 bytes from 0x5
client |<7>| 0000 - 02 00 00 46 03 02 49 30 03 f0 68 cb 07 32 98 35 
client |<7>| 0001 - 4d 10 b6 a9 2c 28 db d3 91 f7 9b 98 7a d0 8b 84 
client |<7>| 0002 - 9b e0 4d 81 ed 7e 20 2f a2 d3 b6 02 6d 87 62 b0 
client |<7>| 0003 - 74 3b 76 ff 5a 47 5a ef b9 e9 87 73 a7 96 07 8a 
client |<7>| 0004 - e3 14 31 c0 78 ea a5 00 33 00 
client |<7>| RB: Have 5 bytes into buffer. Adding 74 bytes.
client |<7>| RB: Requested 79 bytes
client |<2>| ASSERT: gnutls_cipher.c:204
client |<4>| REC[0x11a0ed0]: Decrypted Packet[0] Handshake(22) with length: 74
client |<6>| BUF[HSK]: Inserted 74 bytes of Data(22)
client |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
client |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
client |<3>| HSK[0x11a0ed0]: SERVER HELLO was received [74 bytes]
client |<6>| BUF[REC][HD]: Read 70 bytes of Data(22)
client |<6>| BUF[HSK]: Peeked 0 bytes of Data
client |<6>| BUF[HSK]: Emptied buffer
client |<6>| BUF[HSK]: Inserted 4 bytes of Data
client |<6>| BUF[HSK]: Inserted 70 bytes of Data
client |<3>| HSK[0x11a0ed0]: Server's version: 3.2
client |<3>| HSK[0x11a0ed0]: SessionID length: 32
client |<3>| HSK[0x11a0ed0]: SessionID: 2fa2d3b6026d8762b0743b76ff5a475aefb9e98773a796078ae31431c078eaa5
client |<3>| HSK[0x11a0ed0]: Selected cipher suite: DHE_RSA_AES_128_CBC_SHA1
client |<2>| ASSERT: gnutls_extensions.c:124
client |<7>| READ: Got 5 bytes from 0x5
client |<7>| READ: read 5 bytes from 0x5
client |<7>| 0000 - 16 03 02 02 64 
client |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
client |<7>| RB: Requested 5 bytes
client |<4>| REC[0x11a0ed0]: Expected Packet[1] Handshake(22) with length: 1
client |<4>| REC[0x11a0ed0]: Received Packet[1] Handshake(22) with length: 612
client |<7>| READ: Got 612 bytes from 0x5
client |<7>| READ: read 612 bytes from 0x5
client |<7>| 0000 - 0b 00 02 60 00 02 5d 00 02 5a 30 82 02 56 30 82 
client |<7>| 0001 - 01 c1 a0 03 02 01 02 02 04 46 26 1d 31 30 0b 06 
client |<7>| 0002 - 09 2a 86 48 86 f7 0d 01 01 05 30 19 31 17 30 15 
client |<7>| 0003 - 06 03 55 04 03 13 0e 47 6e 75 54 4c 53 20 74 65 
client |<7>| 0004 - 73 74 20 43 41 30 1e 17 0d 30 37 30 34 31 38 31 
client |<7>| 0005 - 33 32 39 32 31 5a 17 0d 30 38 30 34 31 37 31 33 
client |<7>| 0006 - 32 39 32 31 5a 30 37 31 1b 30 19 06 03 55 04 0a 
client |<7>| 0007 - 13 12 47 6e 75 54 4c 53 20 74 65 73 74 20 73 65 
client |<7>| 0008 - 72 76 65 72 31 18 30 16 06 03 55 04 03 13 0f 74 
client |<7>| 0009 - 65 73 74 2e 67 6e 75 74 6c 73 2e 6f 72 67 30 81 
client |<7>| 000a - 9c 30 0b 06 09 2a 86 48 86 f7 0d 01 01 01 03 81 
client |<7>| 000b - 8c 00 30 81 88 02 81 80 d7 ba 5c af a3 0c f0 2e 
client |<7>| 000c - a9 27 56 aa 53 8e a8 eb 7f 81 75 4c 6b 98 be 4a 
client |<7>| 000d - ea b7 1e f8 4b c3 6a c4 da 0d 00 b8 ea 4c 13 1f 
client |<7>| 000e - 36 16 93 de 72 ef c6 a4 5e b2 6e b6 ca 0a 88 55 
client |<7>| 000f - 75 90 96 ed a6 57 bc 0c 3b 76 0d 97 1e bd e9 ec 
client |<7>| 0010 - 7f d3 a9 ec fb 85 64 a0 6b a0 48 ce 77 7e 73 9c 
client |<7>| 0011 - 31 13 ff 3d c8 ae a5 60 6e d9 b6 8c 5a 9a 6f b6 
client |<7>| 0012 - be 9f 6a bd a7 f0 a0 33 27 f5 b7 1d 92 e5 96 9c 
client |<7>| 0013 - 73 52 d6 9f d6 c8 8e b1 02 03 01 00 01 a3 81 93 
client |<7>| 0014 - 30 81 90 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 
client |<7>| 0015 - 00 30 1a 06 03 55 1d 11 04 13 30 11 82 0f 74 65 
client |<7>| 0016 - 73 74 2e 67 6e 75 74 6c 73 2e 6f 72 67 30 13 06 
client |<7>| 0017 - 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 
client |<7>| 0018 - 03 01 30 0f 06 03 55 1d 0f 01 01 ff 04 05 03 03 
client |<7>| 0019 - 07 a0 00 30 1d 06 03 55 1d 0e 04 16 04 14 eb c7 
client |<7>| 001a - 45 6e e5 f8 25 ca 8c 8d 83 0d 74 e9 86 d4 dd 55 
client |<7>| 001b - b4 75 30 1f 06 03 55 1d 23 04 18 30 16 80 14 e9 
client |<7>| 001c - 3c 1c fb ad 92 6e e6 06 a4 56 2c a2 e1 c0 53 27 
client |<7>| 001d - c8 f2 95 30 0b 06 09 2a 86 48 86 f7 0d 01 01 05 
client |<7>| 001e - 03 81 81 00 68 51 0f 4e df bb 6f 3b c1 b8 e7 fb 
client |<7>| 001f - f9 09 9e 41 c9 f6 f6 44 fa 06 cc a1 d5 11 c9 5d 
client |<7>| 0020 - ff 0a 4e 4e 50 45 fc 29 ea 88 1b a7 de 09 41 67 
client |<7>| 0021 - 0d 43 f4 bb 60 31 47 82 50 f5 03 05 0d 05 15 f0 
client |<7>| 0022 - 77 7a e2 52 c3 27 b3 18 1e 48 3c 58 05 f2 58 6c 
client |<7>| 0023 - 32 de a2 13 41 b2 a6 8f 0c 96 fb 5d a8 a5 59 b3 
client |<7>| 0024 - 10 29 f0 1b 15 0f 1c 9c ec 60 ac e2 8b 51 04 56 
client |<7>| 0025 - 27 42 b7 1f 25 d1 32 16 ea 8d d2 c8 69 08 82 bd 
client |<7>| 0026 - 02 ee 8b 3a 
client |<7>| RB: Have 5 bytes into buffer. Adding 612 bytes.
client |<7>| RB: Requested 617 bytes
client |<2>| ASSERT: gnutls_cipher.c:204
client |<4>| REC[0x11a0ed0]: Decrypted Packet[1] Handshake(22) with length: 612
client |<6>| BUF[HSK]: Inserted 612 bytes of Data(22)
client |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
client |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
client |<3>| HSK[0x11a0ed0]: CERTIFICATE was received [612 bytes]
client |<6>| BUF[REC][HD]: Read 608 bytes of Data(22)
client |<6>| BUF[HSK]: Peeked 74 bytes of Data
client |<6>| BUF[HSK]: Emptied buffer
client |<6>| BUF[HSK]: Inserted 4 bytes of Data
client |<6>| BUF[HSK]: Inserted 608 bytes of Data
server |<3>| HSK[0x11a3a20]: SERVER KEY EXCHANGE was send [397 bytes]
server |<6>| BUF[HSK]: Peeked 0 bytes of Data
server |<6>| BUF[HSK]: Emptied buffer
server |<4>| REC[0x11a3a20]: Sending Packet[2] Handshake(22) with length: 397
server |<2>| ASSERT: gnutls_cipher.c:204
server |<7>| WRITE: Will write 402 bytes to 0x5.
server |<7>| WRITE: wrote 402 bytes to 0x5. Left 0 bytes. Total 402 bytes.
server |<7>| 0000 - 16 03 02 01 8d 0c 00 01 89 00 80 b6 4c 70 da 39 
server |<7>| 0001 - 6c 54 2b 2b 7c ba b1 ac df 88 ac 5f f7 5b cb d5 
server |<7>| 0002 - 16 f0 f3 61 b2 e6 c6 2d 86 42 ff 6c fc f4 06 58 
client |<7>| READ: Got 5 bytes from 0x5
client |<7>| READ: read 5 bytes from 0x5
 0004 - 42 23 54 9a 62 c7 8e 40 82 08 01 83 fb f0 27 f2 
server |<7>| 0005 - 22 91 92 71 6f ef 4b c9 21 af 0d 2b 95 08 b2 78 
client |<7>| 0000 - 16 03 02 01 8d 
client |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
client |<7server |<7>| 0007 - a6 14 e0 fb 1f 4b 26 25 ed 82 37 28 d8 a5 ec 41 
client |<7>| 0000 - 0c 00 01 89 00 80 b6 4c 70 da 39 6c 54 2b 2b 7c 
client |<7>| 0001 - ba b1 ac df 88 ac 5f f7 5b cb d5 16 f0 f3 61 b2 
client |<7>| 0002 - e6 c6 2d 86 42 ff 6c fc f4 06 58 fd 5d f6 2d b6 
server |<7>| 000a - 31 43 87 c6 09 76 30 2d 45 03 60 aa 3d 74 52 a8 
client |<7>| 0003 - 3f 60 e9 ad f7 09 92 75 ad ec a8 42 23 54 9a 62 
server |<7>| 000b - 2a 83 65 f2 74 6f 30 14 3a 65 eb 25 57 fb 9d d4 
client |<7>| 0004 - c7 8e 40 82 08 01 83 fb f0 27 f2 22 91 92 71 6f 
server |<7>| 000c - 29 ae 76 1d 2b ec f5 88 64 99 26 63 2b 60 fe f2 
client |<7>| 0005 - ef 4b c9 21 af 0d 2b 95 08 b2 78 2b d0 80 5d ce 
server |<7>| 000d - 62 e8 96 be 6e c0 6f b3 4d f0 b7 65 86 fb 3f ae 
client |<7>| 0006 - 19 e1 8e 13 2c 1c c3 ea 10 4f 84 a6 14 e0 fb 1f 
server |<7>| 000e - e4 ee 93 88 79 0e ee e2 0b d6 58 0d b1 af 77 85 
client |<7>| 0007 - 4b 26 25 ed 82 37 28 d8 a5 ec 41 5d 0f c0 d2 66 
server |<7>| 000f - 28 b6 2c fb 2b c9 e4 90 14 4c 7c 54 11 9b 20 69 
client |<7>| 0008 - d3 17 d4 0a 9b 57 00 01 05 00 80 6e 40 c9 2d 6e 
server |<7>| 0010 - 51 8e 68 bc 6b 8e ce ac 3f ca 42 e1 97 4d 60 11 
client |<7>| 0009 - de 80 df 3d 25 b5 e9 eb 3d 68 6a 31 43 87 c6 09 
server |<7>| 0011 - 00 80 28 75 80 cd 7e 25 52 45 1a 85 09 d6 c4 34 
client |<7>| 000a - 76 30 2d 45 03 60 aa 3d 74 52 a8 2a 83 65 f2 74 
server |<7>| 0012 - ad 84 36 1c a0 e6 15 d4 9d fc b6 4b 6a 5a 0c 50 
client |<7>| 000b - 6f 30 14 3a 65 eb 25 57 fb 9d d4 29 ae 76 1d 2b 
server |<7>| 0013 - 14 69 28 58 52 0d f8 7e f0 c5 26 3b 7f 4a 8c 70 
client |<7>| 000c - ec f5 88 64 99 26 63 2b 60 fe f2 62 e8 96 be 6e 
server |<7>| 0014 - 07 17 15 05 b1 11 39 6b f8 90 96 54 3d 94 8e 36 
client |<7>| 000d - c0 6f b3 4d f0 b7 65 86 fb 3f ae e4 ee 93 88 79 
server |<7>| 0015 - 1f b7 43 5e 73 21 49 fb 14 b5 de 5f 98 b4 00 b0 
client |<7>| 000e - 0e ee e2 0b d6 58 0d b1 af 77 85 28 b6 2c fb 2b 
server |<7>| 0016 - c9 36 ec e1 22 1c 7d 46 32 2c ab 2d 69 ca 6d 40 
client |<7>| 000f - c9 e4 90 14 4c 7c 54 11 9b 20 69 51 8e 68 bc 6b 
server |<7>| 0017 - a6 64 51 1d 34 f0 35 f1 27 3d 84 24 31 7b 0a 8f 
client |<7>| 0010 - 8e ce ac 3f ca 42 e1 97 4d 60 11 00 80 28 75 80 
server |<7>| 0018 - 0a 0b 9b cc 57 cb 7a 62 84 bb 07 10 77 d8 b9 e5 
server |<7>| 0019 - dc 75 
server |<4>| REC[0x11a3a20]: Sent Packet[3] Handshake(22) with length: 402
server |<3>| HSK[0x11a3a20]: SERVER HELLO DONE was send [4 bytes]
server |<6>| BUF[HSK]: Peeked 0 bytes of Data
server |<6>| BUF[HSK]: client |<7>| 0018 - cb 7a 62 84 bb 07 10 77 d8 b9 e5 dc 75 
client |<7>| RB: Have 5 bytes into buffer. Adding 397 bytes.
client |<7>| RB: Requested 402 bytes
client |<2>| ASSERT: gnutls_cipher.c:204
client |<4>| REC[0x11a0ed0]: Decrypted Packet[2] Handshake(22) with length: 397
client |<6>| BUF[HSK]: Inserted 397 bytes of Data(22)
client |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
client |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
client |<3>| HSK[0x11a0ed0]: SERVER KEY EXCHANGE was received [397 bytes]
client |<6>| BUF[REC][HD]: Read 393 bytes of Data(22)
client |<6>| BUF[HSK]: Peeked 612 bytes of Data
client |<6>| BUF[HSK]: Emptied buffer
client |<6>| BUF[HSK]: Inserted 4 bytes of Data
client |<6>| BUF[HSK]: Inserted 393 bytes of Data
client |<7>| READ: Got 5 bytes from 0x5
client |<7>| READ: read 5 bytes from 0x5
client |<7>| 0000 - 16 03 02 00 04 
client |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
client |<7>| RB: Requested 5 bytes
client |<4>| REC[0x11a0ed0]: Expected Packet[3] Handshake(22) with length: 1
client |<4>| REC[0x11a0ed0]: Received Packet[3] Handshake(22) with length: 4
client |<7>| READ: Got 4 bytes from 0x5
client |<7>| READ: read 4 bytes from 0x5
client |<7>| 0000 - 0e 00 00 00 
client |<7>| RB: Have 5 bytes into buffer. Adding 4 bytes.
client |<7>| RB: Requested 9 bytes
client |<2>| ASSERT: gnutls_cipher.c:204
client |<4>| REC[0x11a0ed0]: Decrypted Packet[3] Handshake(22) with length: 4
client |<6>| BUF[HSK]: Inserted 4 bytes of Data(22)
client |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
client |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
client |<3>| HSK[0x11a0ed0]: SERVER HELLO DONE was received [4 bytes]
client |<2>| ASSERT: gnutls_handshake.c:1123
client |<6>| BUF[HSK]: Peeked 397 bytes of Data
client |<6>| BUF[HSK]: Emptied buffer
client |<6>| BUF[HSK]: Inserted 4 bytes of Data
client |<3>| HSK[0x11a0ed0]: CLIENT KEY EXCHANGE was send [134 bytes]
client |<6>| BUF[HSK]: Peeked 4 bytes of Data
client |<6>| BUF[HSK]: Emptied buffer
client |<4>| REC[0x11a0ed0]: Sending Packet[1] Handshake(22) with length: 134
client |<2>| ASSERT: gnutls_cipher.c:204
client |<7>| WRITE: Will write 139 bytes to 0x5.
client |<7>| WRITE: wrote 139 bytes to 0x5. Left 0 bytes. Total 139 bytes.
client |<7>| 0000 - 16 03 02 00 86 10 00 00 82 00 80 66 c4 24 91 38 
server |<7>| READ: Got 5 bytes from 0x5
server |<7>| READ: read 5 bytclient |<7>| 0002 - 23 36 08 f0 2a c6 b4 46 ec 52 af 85 d1 e0 df 46 
client |<7>| 0003 - 0c 7b 3c 45 9c cf 06 37 80 3f 5e a2 12 46 a8 80 
server |<4>| REC[0x11a3a20]: Expected Packet[1] Handshake(22) with length: 1
server |<4>| REC[0x11a3a20]: Received Packet[1] Handshake(22) with length: 134
>| 0005 - b3 22 be f6 f3 31 b3 28 ac 7f 3a e4 d6 93 3f 25 
client |<7>| 0006 - 9b dc f0 69 a9 7e a4 63 ac ca 8e c7 08 e6 a0 46 
client |<7>| 0007 - 58 73 8a c3 f7 f3 6a af 7b 5f 7c 4b 95 bd 98 f0 
client |<7>| 0008 - 6c 45 c7 d9 36 fd 2c 34 8b a7 e3 
client |<4>| REC[0x11a0ed0]: Sent Packet[2] Handshake(22) with length: 139
client |<3>| REC[0x11a0ed0]: Sent ChangeCipherSpec
client |<4>| REC[0x11a0ed0]: Sending Packet[2] Change Cipher Spec(20) with length: 1
client |<2>| ASSERT: gnutls_cipher.c:204
client |<7>| WRITE: Will write 6 bytes to 0x5.
server |<7>| 0008 - fd 2c 34 8b a7 e3 
server |<7>| RB: Have 5 bytes into buffer. Adding 134 bytes.
server |<7>| RB: Requested 139 bytes
server |<2>| ASSERT: gnutls_cipher.c:204
client |<9>| INT: PREMASTER SECRET[128]: 41167049932bc84516104c5a35c565b8f77c55cserver |<6>| BUF[HSK]: Inserted 134 bytes of Data(22)
client |<9>| INT: CLIENT RANDOM[32]: 493003f07cb0a96ff6f64d34a0775a8fe16e8207e1d499379094be7d54a4d653
)
server |<3>| HSK[0x11a3a20]: CLIENT KEY EXCHANGE was received [134 bytes]
server |<6>| BUF[REC][HD]: Read 130 bytes of Data(22)
server |<6>| BUF[HSK]: Peeked 0 bytes of Data
server |<6>| BUF[HSK]: Emptied buffer
server |<6>| BUF[HSK]: Inserted 4 bytes of Data
server |<6>| BUF[HSK]: Inserted 130 bytes of Data
client |<9>| INT: MASTER SECRET: 8297ae98d8ec3fad5c87234f9566a3a3184ba0578f34e95953ec3ba3a795066fb065484b92310e49ddd349a16a87e19a
client |<9>| INT: KEY BLOCK[104]: ad2bd026a0c1a87c3af3b45ebbea20ce8bde45b2db0ba6fef618b72eeec569de
client |<9>| INT: CLIENT WRITE KEY [16]: 6e9f1ef36d56350aa51d7be0862c3302
client |<9>| INT: SERVER WRITE KEY [16]: 1e1b4a6c7f77c32d73a1d424a06d03a6
client |<3>| HSK[0x11a0ed0]: Cipher Suite: DHE_RSA_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Initializing internal [write] cipher sessions
client |<6>| BUF[HSK]: Peeked 0 bytes of Data
client |<6>| BUF[HSK]: Emptied buffer
client |<3>| HSK[0x11a0ed0]: FINISHED was send [16 bytes]
client |<6>| BUF[HSK]: Peeked 0 bytes of Data
client |<6>| BUF[HSK]: Emptied buffer
client |<4>| REC[0x11a0ed0]: Sending Packet[0] Handshake(22) with length: 16
client |<7>| WRITE: Will write 133 bytes to 0x5.
client |<7>| WRITE: wrote 133 bytes to 0x5. Left 0 bytes. Total 133 bytes.
client |<7>| 0000 - 16 03 02 00 80 33 01 98 eb b7 08 19 70 b3 7a c3 
client |<7>| 0001 - 70 df 5e 2b 67 fd 0a 3f 03 28 58 76 3f 68 07 77 
client |<7>| 0002 - 61 04 a5 cc 4e f9 d0 e7 a1 f5 10 ef 22 07 a3 3c 
client |<7>| 0003 - fe 5e ed a4 7b 52 66 80 4c 73 79 8c 26 df 3e 8a 
client |<7>| 0004 - 71 a8 e7 a5 48 b5 f9 78 6b d4 de 34 30 6b 41 9b 
client |<7>| 0005 - 85 e4 f8 3e 50 1f f9 77 fd 4a f4 6e a4 9a da 54 
client |<7>| 0006 - 28 e6 ff 7a 7c 9a 1e 75 37 2f 51 c4 a3 9a af 5f 
client |<7>| 0007 - bf 89 9e 82 22 9f 87 9c 77 b0 40 85 bd c1 75 a2 
client |<7>| 0008 - 36 d3 8e 9b d3 
client |<4>| REC[0x11a0ed0]: Sent Packet[1] Handshake(22) with length: 133
server |<7>| READ: Got 5 bytes from 0x5
server |<7>| READ: read 5 bytes from 0x5
server |<7>| 0000 - 14 03 02 00 01 
server |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
server |<7>| RB: Requested 5 bytes
server |<4>| REC[0x11a3a20]: Expected Packet[2] Change Cipher Spec(20) with length: 1
server |<4>| REC[0x11a3a20]: Received Packet[2] Change Cipher Spec(20) with length: 1
server |<7>| READ: Got 1 bytes from 0x5
server |<7>| READ: read 1 bytes from 0x5
server |<7>| 0000 - 01 
server |<7>| RB: Have 5 bytes into buffer. Adding 1 bytes.
server |<7>| RB: Requested 6 bytes
server |<2>| ASSERT: gnutls_cipher.c:204
server |<4>| REC[0x11a3a20]: ChangeCipherSpec Packet was received
server |<9>| INT: PREMASTER SECRET[128]: 41167049932bc84516104c5a35c565b8f77c55c8f51920db9918c959f0a0b81a42f33e5e19e73bc00de227df548dc9ab7d3bee6def0264a6d50945f305836d1867155349dc79278e98b4598d99e60031f879c4d4501a00b3724d75ae8d998424f2bb63d0ecb714c64433ede260f45aa08e5a108fbea41fece3cf912532396238
server |<9>| INT: CLIENT RANDOM[32]: 493003f07cb0a96ff6f64d34a0775a8fe16e8207e1d499379094be7d54a4d653
server |<9>| INT: SERVER RANDOM[32]: 493003f068cb073298354d10b6a92c28dbd391f79b987ad08b849be04d81ed7e
server |<9>| INT: MASTER SECRET: 8297ae98d8ec3fad5c87234f9566a3a3184ba0578f34e95953ec3ba3a795066fb065484b92310e49ddd349a16a87e19a
server |<9>| INT: KEY BLOCK[104]: ad2bd026a0c1a87c3af3b45ebbea20ce8bde45b2db0ba6fef618b72eeec569de
server |<9>| INT: CLIENT WRITE KEY [16]: 6e9f1ef36d56350aa51d7be0862c3302
server |<9>| INT: SERVER WRITE KEY [16]: 1e1b4a6c7f77c32d73a1d424a06d03a6
server |<3>| HSK[0x11a3a20]: Cipher Suite: DHE_RSA_AES_128_CBC_SHA1
server |<3>| HSK[0x11a3a20]: Initializing internal [read] cipher sessions
server |<7>| READ: Got 5 bytes from 0x5
server |<7>| READ: read 5 bytes from 0x5
server |<7>| 0000 - 16 03 02 00 80 
server |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
server |<7>| RB: Requested 5 bytes
server |<4>| REC[0x11a3a20]: Expected Packet[0] Handshake(22) with length: 1
server |<4>| REC[0x11a3a20]: Received Packet[0] Handshake(22) with length: 128
server |<7>| READ: Got 128 bytes from 0x5
server |<7>| READ: read 128 bytes from 0x5
server |<7>| 0000 - 33 01 98 eb b7 08 19 70 b3 7a c3 70 df 5e 2b 67 
server |<7>| 0001 - fd 0a 3f 03 28 58 76 3f 68 07 77 61 04 a5 cc 4e 
server |<7>| 0002 - f9 d0 e7 a1 f5 10 ef 22 07 a3 3c fe 5e ed a4 7b 
server |<7>| 0003 - 52 66 80 4c 73 79 8c 26 df 3e 8a 71 a8 e7 a5 48 
server |<7>| 0004 - b5 f9 78 6b d4 de 34 30 6b 41 9b 85 e4 f8 3e 50 
server |<7>| 0005 - 1f f9 77 fd 4a f4 6e a4 9a da 54 28 e6 ff 7a 7c 
server |<7>| 0006 - 9a 1e 75 37 2f 51 c4 a3 9a af 5f bf 89 9e 82 22 
server |<7>| 0007 - 9f 87 9c 77 b0 40 85 bd c1 75 a2 36 d3 8e 9b d3 
server |<7>| 0008 - 
server |<7>| RB: Have 5 bytes into buffer. Adding 128 bytes.
server |<7>| RB: Requested 133 bytes
server |<4>| REC[0x11a3a20]: Decrypted Packet[0] Handshake(22) with length: 16
server |<6>| BUF[HSK]: Inserted 16 bytes of Data(22)
server |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
server |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
server |<3>| HSK[0x11a3a20]: FINISHED was received [16 bytes]
server |<6>| BUF[REC][HD]: Read 12 bytes of Data(22)
server |<6>| BUF[HSK]: Peeked 134 bytes of Data
server |<6>| BUF[HSK]: Emptied buffer
server |<6>| BUF[HSK]: Inserted 4 bytes of Data
server |<6>| BUF[HSK]: Inserted 12 bytes of Data
server |<3>| REC[0x11a3a20]: Sent ChangeCipherSpec
server |<4>| REC[0x11a3a20]: Sending Packet[4] Change Cipher Spec(20) with length: 1
server |<2>| ASSERT: gnutls_cipher.c:204
server |<7>| WRITE: Will write 6 bytes to 0x5.
server |<7>| WRITE: wrote 6 bytes to 0x5. Left 0 bytes. Total 6 bytes.
server |<7>| 0000 - 14 03 02 00 01 01 
server |<4>| REC[0x11a3a20]: Sent Packet[5] Change Cipher Spec(20) with length: 6client |<7>| 0000 - 14 03 02 00 01 
client |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
client |<server |<3>| HSK[0x11a3a20]: Initializing internal [write] cipher sessions
hange Cipher Spec(20) with length: 1
client |<4>| REC[0x11a0ed0]: Received Packet[4] Change Cipher Spec(20) with length: 1
client |<7>| READ: Got 1 bytes from 0x5
client |<7>| READ: read 1 bytes from 0x5
client |<7>| 0000 - 01 
client |<7>| RB: Have 5 bytes into buffer. Adding 1 bytes.
client |<7>| RB: Requested 6 bytes
client |<2>| ASSERT: gnutls_cipher.c:204
client |<4>| REC[0x11a0ed0]: ChangeCipherSpec Packet was received
client |<3>| HSK[0x11a0ed0]: Cipher Suite: DHE_RSA_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Initializing internal [read] cipher sessions
server |<3>| HSK[0x11a3a20]: FINISHED was send [16 bytes]
server |<6>| BUF[HSK]: Peeked 0 bytes of Data
server |<6>| BUF[HSK]: Emptied buffer
server |<4>| REC[0x11a3a20]: Sending Packet[0] Handshake(22) with length: 16
server |<7>| WRITE: Will write 85 bytes to 0x5.
server |<7>| WRITE: wrote 85 bytes to 0x5. Left 0 bytes. Total 85 bytes.
server |<7>| 0000 - 16 03 02 00 50 8f 39 bc fe 37 6f 4c 5b fa ac 42 
server |<7>| 0001 - 7f 7c 95 90 b0 d4 76 42 9f 85 a2 75 eb 50 9c 50 
server |<7>| 0002 - 19 d7 4f aa 3e 47 5d d0 eb 92 82 18 e3 47 dc 03 
server |<7>| 0003 - 34 23 af a8 a0 ee 5d 28 94 24 7d a6 67 d8 7d eb 
server |<7>| 0004 - 20 87 0d ad 24 7a 88 c3 31 f7 45 9e 87 9c b8 45 
server |<7>| 0005 - 02 62 31 f9 ac 
server |<4>| REC[0x11a3a20]: Sent Packet[1] Handshake(22) with length: 85
server |<6>| BUF[HSK]: Cleared Data from buffer
client |<7>| READ: Got 5 bytes from 0x5
client |<7>| READ: read 5 bytes from 0x5
client |<7>| 0000 - 16 03 02 00 50 
client |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
client |<7>| RB: Requested 5 bytes
client |<4>| REC[0x11a0ed0]: Expected Packet[0] Handshake(22) with length: 1
client |<4>| REC[0x11a0ed0]: Received Packet[0] Handshake(22) with length: 80
client |<7>| READ: Got 80 bytes from 0x5
client |<7>| READ: read 80 bytes from 0x5
client |<7>| 0000 - 8f 39 bc fe 37 6f 4c 5b fa ac 42 7f 7c 95 90 b0 
client |<7>| 0001 - d4 76 42 9f 85 a2 75 eb 50 9c 50 19 d7 4f aa 3e 
client |<7>| 0002 - 47 5d d0 eb 92 82 18 e3 47 dc 03 34 23 af a8 a0 
client |<7>| 0003 - ee 5d 28 94 24 7d a6 67 d8 7d eb 20 87 0d ad 24 
client |<7>| 0004 - 7a 88 c3 31 f7 45 9e 87 9c b8 45 02 62 31 f9 ac 
client |<7>| 0005 - 
client |<7>| RB: Have 5 bytes into buffer. Adding 80 bytes.
client |<7>| RB: Requested 85 bytes
client |<4>| REC[0x11a0ed0]: Decrypted Packet[0] Handshake(22) with length: 16
client |<6>| BUF[HSK]: Inserted 16 bytes of Data(22)
client |<6>| BUF[REC][HD]: Read 1 bytes of Data(22)
client |<6>| BUF[REC][HD]: Read 3 bytes of Data(22)
client |<3>| HSK[0x11a0ed0]: FINISHED was received [16 bytes]
client |<6>| BUF[REC][HD]: Read 12 bytes of Data(22)
client |<6>| BUF[HSK]: Peeked 0 bytes of Data
client |<6>| BUF[HSK]: Emptied buffer
client |<6>| BUF[HSK]: Inserted 4 bytes of Data
client |<6>| BUF[HSK]: Inserted 12 bytes of Data
client |<6>| BUF[HSK]: Cleared Data from buffer
client |<4>| REC[0x11a0ed0]: Sending Packet[1] Application Data(23) with length: 9
client |<7>| WRITE: Will write 85 bytes to 0x5.
client |<7>| WRITE: wrote 85 bytes to 0x5. Left 0 bytes. Total 85 bytes.
server |<7>| READ: Got 5 bytes from 0x5
server |<7>| READ: read 5 bytes from 0x5
server |<7>| 0000 - 17 03 02 00 50 
server |<7>| RB: Haveclient |<7>| 0002 - 3b ac fd 6b fd 0a f3 50 dc fa 5a 68 f8 b2 be b3 
client |<7>| 0003 - 16 dc 5e 79 16 48 a9 78 8e 99 d5 2f 00 5c 9e 78 
client |<7>| 0004 - e5 a5 3e 6d 24 6b 04 55 75 d2 41 d5 80 64 1c 49 
client |<7>| 0005 - d2 38 b2 2f 7f 
client |<4>| REC[0x11a0ed0]: Sent Packet[2] Application Data(23) with length: 85
client |<7>| READ: Got 5 bytes from 0x5
client |<7>| READ: read 5 bytes from 0x5
client |<7>| 0000 - 16 03 02 00 70 
client |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
client |<7>| RB: Requested 5 bytes
client |<4>| REC[0x11a0ed0]: Expected Packet[1] Application Data(23) with length: 1024
client |<4>| REC[0x11a0ed0]: Received Packet[1] Handshake(22) with length: 112
client |<7>| READ: Got 112 bytes from 0x5
client |<7>| READ: read 112 bytes from 0x5
client |<7>| 0000 - 57 86 69 e7 ca 7f 9d 3b 24 99 e4 52 7c ed c3 47 
client |<7>| 0001 - 0c dd db d8 25 43 a7 cd 60 14 93 aa 4c f5 46 81 
client |<7>| 0002 - 54 76 c1 a3 07 b4 98 08 4e 81 45 42 6f 35 66 51 
client |<7>| 0003 - 1b ab 03 9c 6c 1b 57 0f 8c 92 1e 37 fa 54 7f 71 
client |<7>| 0004 - b1 ac 00 ff 7b 73 59 f1 e8 34 28 99 ef 38 a6 5e 
client |<7>| 0005 - 7f 0e ed 2f 91 1d 39 64 8d 81 b7 97 99 38 01 d2 
client |<7>| 0006 - 4b c7 1a 1f a0 47 c1 f4 ff 4e 7d 86 bf 77 48 97 
client |<7>| 0007 - 
client |<7>| RB: Have 5 bytes into buffer. Adding 112 bytes.
client |<7>| RB: Requested 117 bytes
client |<4>| REC[0x11a0ed0]: Decrypted Packet[1] Handshake(22) with length: 4
client |<2>| ASSERT: gnutls_record.c:1048
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
client |<3>| HSK[0x11a0ed0]: Keeping ciphersuite: RSA_ARCFOUR_MD5
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: PSK_SHA_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: PSK_SHA_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: PSK_SHA_ARCFOUR_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
client |<3>| HSK[0x11a0ed0]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
client |<2>| EXT[0x11a0ed0]: Sending extension CERT_TYPE
client |<3>| HSK[0x11a0ed0]: CLIENT HELLO was send [76 bytes]
client |<6>| BUF[HSK]: Peeked 0 bytes of Data
client |<6>| BUF[HSK]: Emptied buffer
client |<4>| REC[0x11a0ed0]: Sending Packet[2] Handshake(22) with length: 76
client |<7>| WRITE: Will write 261 bytes to 0x5.
client |<7>| WRITE: wrote 261 bytes to 0x5. Left 0 bytes. Total 261 bytes.
client |<7>| 0000 - 16 03 02 01 00 cb 67 f2 aa 40 3b 80 d1 f5 11 da 
client |<7>| 0001 - 00 f4 b4 36 f9 f9 ac fb 12 53 79 84 1c b3 05 17 
client |<7>| 0002 - 4b b4 cd 56 c3 3e 13 c2 63 f6 36 54 0f c2 86 74 
client |<7>| 0003 - 05 1d a3 4a 1f bb 14 0f 32 da c2 f5 a1 2e 2f d3 
client |<7>| 0004 - 8c f6 18 08 7e 51 69 82 ef 9f 4d a4 a8 f0 79 83 
client |<7>| 0005 - 1d 6e 4d 6d 0a e6 16 e7 e3 5a 05 77 ae 95 d2 af 
client |<7>| 0006 - 04 a3 1f 4e 30 a3 11 a0 e2 ea 47 01 e4 32 ba e9 
client |<7>| 0007 - d5 0b f5 8c 1a 56 e3 04 62 2f 66 c1 e2 71 e5 14 
client |<7>| 0008 - 0b 33 5c 9f 33 24 ba 33 be e1 46 c2 2f 62 12 7d 
client |<7>| 0009 - 69 ee 97 73 57 c3 60 a8 1d bc d9 b4 d8 d3 17 94 
client |<7>| 000a - ea 22 4b 57 0d a7 54 9b de 06 be 65 99 23 e6 11 
client |<7>| 000b - 78 a2 7f c8 ef 80 82 c8 0d 00 39 8f bb e1 ab 9f 
client |<7>| 000c - 18 58 36 0f de 70 d1 85 c9 6b f0 0d e7 7d 64 90 
client |<7>| 000d - 2c 52 48 f9 17 58 67 c9 83 0f 9c c5 3c d0 45 24 
client |<7>| 000e - 7b 13 0a 44 39 81 94 30 59 08 92 a0 1c 60 52 a3 
client |<7>| 000f - e3 8f 56 c0 48 ea d4 d0 d7 86 22 e9 5c 47 2c ca 
client |<7>| 0010 - 47 6c a3 d3 c3 
client |<4>| REC[0x11a0ed0]: Sent Packet[3] Handshake(22) with length: 261
server |<7>| READ: Got 5 bytes from 0x5
server |<7>| READ: read 5 bytes from 0x5
server |<7>| 0000 - 16 03 02 01 00 
server |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
server |<7>| RB: Requested 5 bytes
server |<4>| REC[0x11a3a20]: Expected Packet[2] Application Data(23) with length: 1024
server |<4>| REC[0x11a3a20]: Received Packet[2] Handshake(22) with length: 256
server |<7>| READ: Got 256 bytes from 0x5
server |<7>| READ: read 256 bytes from 0x5
server |<7>| 0000 - cb 67 f2 aa 40 3b 80 d1 f5 11 da 00 f4 b4 36 f9 
server |<7>| 0001 - f9 ac fb 12 53 79 84 1c b3 05 17 4b b4 cd 56 c3 
server |<7>| 0002 - 3e 13 c2 63 f6 36 54 0f c2 86 74 05 1d a3 4a 1f 
server |<7>| 0003 - bb 14 0f 32 da c2 f5 a1 2e 2f d3 8c f6 18 08 7e 
server |<7>| 0004 - 51 69 82 ef 9f 4d a4 a8 f0 79 83 1d 6e 4d 6d 0a 
server |<7>| 0005 - e6 16 e7 e3 5a 05 77 ae 95 d2 af 04 a3 1f 4e 30 
server |<7>| 0006 - a3 11 a0 e2 ea 47 01 e4 32 ba e9 d5 0b f5 8c 1a 
server |<7>| 0007 - 56 e3 04 62 2f 66 c1 e2 71 e5 14 0b 33 5c 9f 33 
server |<7>| 0008 - 24 ba 33 be e1 46 c2 2f 62 12 7d 69 ee 97 73 57 
server |<7>| 0009 - c3 60 a8 1d bc d9 b4 d8 d3 17 94 ea 22 4b 57 0d 
server |<7>| 000a - a7 54 9b de 06 be 65 99 23 e6 11 78 a2 7f c8 ef 
server |<7>| 000b - 80 82 c8 0d 00 39 8f bb e1 ab 9f 18 58 36 0f de 
server |<7>| 000c - 70 d1 85 c9 6b f0 0d e7 7d 64 90 2c 52 48 f9 17 
server |<7>| 000d - 58 67 c9 83 0f 9c c5 3c d0 45 24 7b 13 0a 44 39 
server |<7>| 000e - 81 94 30 59 08 92 a0 1c 60 52 a3 e3 8f 56 c0 48 
server |<7>| 000f - ea d4 d0 d7 86 22 e9 5c 47 2c ca 47 6c a3 d3 c3 
server |<7>| 0010 - 
server |<7>| RB: Have 5 bytes into buffer. Adding 256 bytes.
server |<7>| RB: Requested 261 bytes
server |<4>| REC[0x11a3a20]: Decrypted Packet[2] Handshake(22) with length: 76
server |<2>| ASSERT: gnutls_record.c:746
server |<2>| ASSERT: gnutls_record.c:1048
server: Received corrupted data(-37). Closing...
server |<4>| REC: Sending Alert[1|0] - Close notify
server |<4>| REC[0x11a3a20]: Sending Packet[3] Alert(21) with length: 2
server |<7>| WRITE: Will write 69 bytes to 0x5.
server |<7>| WRITE: wrote 69 bytes to 0x5. Left 0 bytes. Total 69 bytes.
server |<7>| 0000 - 15 03 02 00 40 8a 02 8d 6b d7 ec 7b f7 6d 9c 54 
server |<7>| 0001 - 6c 84 c5 56 eb 91 b9 e7 92 b5 54 97 e1 45 3d 74 
server |<7>| 0002 - 11 f5 7a 89 76 2b 97 c9 da 88 02 a2 9e 63 3e 76 
server |<7>| 0003 - 5d cf 04 0d d9 b2 6c b7 73 d5 9c f1 61 b1 a3 f7 
server |<7>| 0004 - d6 43 44 f0 25 
server |<4>| REC[0x11a3a20]: Sent Packet[4] Alert(21) with length: 69
client |<7>| READ: Got 5 bytes from 0x5
client |<7>| READ: read 5 bytes from 0x5
client |<7>| 0000 - 17 03 02 00 f0 
client |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
client |<7>| RB: Requested 5 bytes
client |<4>| REC[0x11a0ed0]: Expected Packet[2] Handshake(22) with length: 1
client |<4>| REC[0x11a0ed0]: Received Packet[2] Application Data(23) with length: 240
client |<7>| READ: Got 239 bytes from 0x5
client |<7>| READ: read 239 bytes from 0x5
client |<7>| 0000 - 75 1e e5 8f 3e ce d1 13 fa 2e 74 4f ce e0 a2 f7 
client |<7>| 0001 - e3 03 d2 0b 11 c8 ae ba d0 0b c6 18 a5 75 38 b5 
client |<7>| 0002 - 80 26 fc 78 0d b2 84 cf 32 50 67 45 39 fe 82 e2 
client |<7>| 0003 - 48 72 2c 8e 53 51 5b 17 40 7d 5e 96 4c 1f 5b 81 
client |<7>| 0004 - cc 9c 60 9c f0 4d df 93 e0 36 fd e1 74 cb dc b3 
client |<7>| 0005 - b9 dd a5 e8 6b 6d 54 58 fb ba c4 cc 7c 15 4d 3f 
client |<7>| 0006 - 0a 63 6a 04 c2 18 ec a3 5e 9f 7c 8a d1 3c 20 ee 
client |<7>| 0007 - 48 16 e0 15 95 00 66 30 ab 15 71 ed 04 44 09 3a 
client |<7>| 0008 - d7 d5 05 30 04 d5 c0 56 d5 f9 5a 48 bc de 1a cc 
client |<7>| 0009 - 50 5f e2 6d 7f 9e a9 5e cd ba a5 ca e4 fe d9 77 
client |<7>| 000a - ac be 19 5f c8 d0 6a 35 12 62 46 3f 31 50 dd 13 
client |<7>| 000b - 17 71 a0 44 3e dc 7f fc 7b ae 5c 11 43 44 9e 1e 
client |<7>| 000c - 7b f6 3f 72 31 cf a4 2a 91 09 45 a2 92 08 ae 2e 
client |<7>| 000d - ee 02 1b 12 0e 7e 9b 68 b9 a9 c4 67 63 aa f1 df 
client |<7>| 000e - f7 87 dd 0a 08 7f 4a ad 1a ca 78 c7 72 b9 e6 
client |<7>| RB: Have 5 bytes into buffer. Adding 239 bytes.
client |<7>| RB: Requested 245 bytes
client |<7>| READ: Got 1 bytes from 0x5
client |<7>| READ: read 1 bytes from 0x5
client |<7>| 0000 - 7e 
client |<7>| RB-PEEK: Read 1 bytes in PEEK MODE.
client |<7>| RB-PEEK: Have 244 bytes into buffer. Adding 1 bytes.
RB: Requested 245 bytes
client |<4>| REC[0x11a0ed0]: Decrypted Packet[2] Application Data(23) with length: 9
client |<6>| BUF[REC]: Inserted 9 bytes of Data(23)
client |<2>| ASSERT: gnutls_record.c:735
client |<2>| ASSERT: gnutls_record.c:1048
client |<2>| ASSERT: gnutls_buffers.c:1030
client |<2>| ASSERT: gnutls_handshake.c:1045
client |<2>| ASSERT: gnutls_handshake.c:2346
client |<6>| BUF[HSK]: Cleared Data from buffer
client: handshake failed.
client: Error: An unexpected TLS packet was received.


More information about the neon mailing list