Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 530054 Details for
Bug 654918
net-libs/gnutls-3.6.7: dtls-repro-20170915 test fails
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
dtls-repro-20170915.log
dtls-repro-20170915.log (text/plain), 12.17 KB, created by
Rolf Eike Beer
on 2018-05-05 20:28:02 UTC
(
hide
)
Description:
dtls-repro-20170915.log
Filename:
MIME Type:
Creator:
Rolf Eike Beer
Created:
2018-05-05 20:28:02 UTC
Size:
12.17 KB
patch
obsolete
>gnutls[2]: Enabled GnuTLS 3.5.18 logging... >gnutls[2]: getrandom random generator was detected >gnutls[2]: cached system priority /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/tests/system.prio mtime 1459588815 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/attributes.c[_x509_parse_attribute]:103 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/attributes.c[_x509_parse_attribute]:174 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/extensions.c[_gnutls_get_extension]:65 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/extensions.c[_gnutls_get_extension]:65 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/x509_ext.c[gnutls_subject_alt_names_get]:110 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/x509.c[get_alt_name]:1701 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/dn.c[_gnutls_x509_parse_dn_oid]:348 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/dn.c[_gnutls_x509_parse_dn_oid]:458 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/x509.c[gnutls_x509_crt_get_dn_by_oid]:871 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/extensions.c[_gnutls_get_extension]:65 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/mpi.c[_gnutls_x509_read_uint]:246 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/dh.c[gnutls_dh_params_import_pkcs3]:381 >(null)|<5>| REC[0x84bd8]: Allocating epoch #0 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/attributes.c[_x509_parse_attribute]:103 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/attributes.c[_x509_parse_attribute]:174 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/extensions.c[_gnutls_get_extension]:65 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/extensions.c[_gnutls_get_extension]:65 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/x509_ext.c[gnutls_subject_alt_names_get]:110 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/x509.c[get_alt_name]:1701 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/dn.c[_gnutls_x509_parse_dn_oid]:348 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/dn.c[_gnutls_x509_parse_dn_oid]:458 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/x509.c[gnutls_x509_crt_get_dn_by_oid]:871 >(null)|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/x509/extensions.c[_gnutls_get_extension]:65 >(null)|<5>| REC[0x8d950]: Allocating epoch #0 >negotiating DTLS 1.2 with cli-cert >client|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/constate.c[_gnutls_epoch_get]:600 >client|<5>| REC[0x8d950]: Allocating epoch #1 >client|<4>| HSK[0x8d950]: Adv. version: 254.255 >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A) >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09) >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08) >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1 (C0.14) >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 (C0.13) >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12) >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CBC_SHA1 (00.35) >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_CBC_SHA1 (00.84) >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CBC_SHA1 (00.2F) >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_CBC_SHA1 (00.41) >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_RSA_3DES_EDE_CBC_SHA1 (00.0A) >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CBC_SHA1 (00.39) >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88) >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CBC_SHA1 (00.33) >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45) >client|<4>| HSK[0x8d950]: Keeping ciphersuite: GNUTLS_DHE_RSA_3DES_EDE_CBC_SHA1 (00.16) >client|<4>| EXT[0x8d950]: Sending extension Extended Master Secret (0 bytes) >client|<4>| EXT[0x8d950]: Sending extension OCSP Status Request (5 bytes) >client|<4>| EXT[0x8d950]: Sending extension Safe Renegotiation (1 bytes) >client|<4>| EXT[0x8d950]: Sending extension Session Ticket (0 bytes) >client|<4>| EXT[0x8d950]: Sending extension Supported curves (12 bytes) >client|<4>| EXT[0x8d950]: Sending extension Supported ECC Point Formats (2 bytes) >client|<4>| HSK[0x8d950]: CLIENT HELLO was queued [130 bytes] >client|<6>| DTLS[0x8d950]: Start of flight transmission. >client|<6>| DTLS[0x8d950]: Sending Packet[0] fragment CLIENT HELLO(1) with length: 118, offset: 0, fragment length: 118, mtu: 1427 >client|<5>| REC[0x8d950]: Preparing Packet Handshake(22) with length: 130 and min pad: 0 >client|<5>| REC[0x8d950]: Sent Packet[1] Handshake(22) in epoch 0 and length: 143 >client|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/dtls.c[_dtls_transmit]:420 >server|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/constate.c[_gnutls_epoch_get]:600 >server|<5>| REC[0x84bd8]: Allocating epoch #1 >server|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/buffers.c[get_last_packet]:1164 >server|<5>| REC[0x84bd8]: SSL 254.255 Handshake packet received. Epoch 0, length: 130 >server|<5>| REC[0x84bd8]: Expected Packet Handshake(22) >server|<5>| REC[0x84bd8]: Received Packet Handshake(22) with length: 130 >server|<5>| REC[0x84bd8]: Decrypted Packet[0.0] Handshake(22) with length: 130 >server|<4>| HSK[0x84bd8]: CLIENT HELLO (1) was received. Length 118[118], frag offset 0, frag length: 118, sequence: 0 >server|<4>| HSK[0x84bd8]: Client's version: 254.255 >server|<4>| HSK[0x84bd8]: Selected version DTLS1.0 >server|<4>| EXT[0x84bd8]: Parsing extension 'Extended Master Secret/23' (0 bytes) >server|<4>| EXT[0x84bd8]: Found extension 'OCSP Status Request/5' >server|<4>| EXT[0x84bd8]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) >server|<4>| EXT[0x84bd8]: Found extension 'Session Ticket/35' >server|<4>| EXT[0x84bd8]: Found extension 'Supported curves/10' >server|<4>| EXT[0x84bd8]: Found extension 'Supported ECC Point Formats/11' >server|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/db.c[_gnutls_server_restore_session]:276 >server|<4>| EXT[0x84bd8]: Found extension 'Extended Master Secret/23' >server|<4>| EXT[0x84bd8]: Found extension 'OCSP Status Request/5' >server|<4>| EXT[0x84bd8]: Found extension 'Safe Renegotiation/65281' >server|<4>| EXT[0x84bd8]: Found extension 'Session Ticket/35' >server|<4>| EXT[0x84bd8]: Found extension 'Supported curves/10' >server|<4>| EXT[0x84bd8]: Found extension 'Supported ECC Point Formats/11' >server|<4>| EXT[0x84bd8]: Found extension 'Extended Master Secret/23' >server|<4>| EXT[0x84bd8]: Found extension 'OCSP Status Request/5' >server|<4>| EXT[0x84bd8]: Found extension 'Safe Renegotiation/65281' >server|<4>| EXT[0x84bd8]: Parsing extension 'Session Ticket/35' (0 bytes) >server|<4>| EXT[0x84bd8]: Parsing extension 'Supported curves/10' (12 bytes) >server|<4>| HSK[0x84bd8]: Selected ECC curve SECP256R1 (2) >server|<4>| EXT[0x84bd8]: Parsing extension 'Supported ECC Point Formats/11' (2 bytes) >server|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/ext/server_name.c[gnutls_server_name_get]:310 >server|<4>| HSK[0x84bd8]: Requested server name: '' >server|<4>| HSK[0x84bd8]: Requested PK algorithm: EC/ECDSA (4) -- ctype: X.509 (1) >server|<4>| HSK[0x84bd8]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1) >server|<4>| HSK[0x84bd8]: Requested PK algorithm: RSA (1) -- ctype: X.509 (1) >server|<4>| HSK[0x84bd8]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1 (C0.14) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1 (C0.13) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_RSA_AES_256_CBC_SHA1 (00.35) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_256_CBC_SHA1 (00.84) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_RSA_AES_128_CBC_SHA1 (00.2F) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_RSA_CAMELLIA_128_CBC_SHA1 (00.41) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_RSA_3DES_EDE_CBC_SHA1 (00.0A) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_256_CBC_SHA1 (00.39) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_DHE_RSA_AES_128_CBC_SHA1 (00.33) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_DHE_RSA_3DES_EDE_CBC_SHA1 (00.16) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_ECDH_ANON_AES_256_CBC_SHA1 (C0.19) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_ECDH_ANON_AES_128_CBC_SHA1 (C0.18) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_ECDH_ANON_3DES_EDE_CBC_SHA1 (C0.17) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_DH_ANON_AES_256_CBC_SHA1 (00.3A) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_DH_ANON_CAMELLIA_256_CBC_SHA1 (00.89) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_DH_ANON_AES_128_CBC_SHA1 (00.34) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_DH_ANON_CAMELLIA_128_CBC_SHA1 (00.46) >server|<4>| HSK[0x84bd8]: Keeping ciphersuite: GNUTLS_DH_ANON_3DES_EDE_CBC_SHA1 (00.1B) >server|<4>| HSK[0x84bd8]: Requested cipher suites[size: 32]: >server|<4>| 0xc0, 0x0a ECDHE_ECDSA_AES_256_CBC_SHA1 >server|<4>| 0xc0, 0x09 ECDHE_ECDSA_AES_128_CBC_SHA1 >server|<4>| 0xc0, 0x08 ECDHE_ECDSA_3DES_EDE_CBC_SHA1 >server|<4>| 0xc0, 0x14 ECDHE_RSA_AES_256_CBC_SHA1 >server|<4>| HSK[0x84bd8]: Selected cipher suite: ECDHE_RSA_AES_256_CBC_SHA1 >server|<4>| HSK[0x84bd8]: Selected Compression Method: NULL >server|<4>| EXT[0x84bd8]: Found extension 'Extended Master Secret/23' >server|<4>| EXT[0x84bd8]: Parsing extension 'OCSP Status Request/5' (5 bytes) >server|<4>| EXT[0x84bd8]: Found extension 'Safe Renegotiation/65281' >server|<4>| EXT[0x84bd8]: Found extension 'Session Ticket/35' >server|<4>| EXT[0x84bd8]: Found extension 'Supported curves/10' >server|<4>| EXT[0x84bd8]: Found extension 'Supported ECC Point Formats/11' >server|<4>| HSK[0x84bd8]: Safe renegotiation succeeded >server|<4>| EXT[0x84bd8]: Sending extension Extended Master Secret (0 bytes) >server|<4>| EXT[0x84bd8]: Sending extension Safe Renegotiation (1 bytes) >server|<4>| EXT[0x84bd8]: Sending extension Supported ECC Point Formats (2 bytes) >server|<4>| HSK[0x84bd8]: SessionID: 41e9ac7188d88d9b93bb9381d3c984190f756d48e690ecd640ce7502a351bb97 >server|<4>| HSK[0x84bd8]: SERVER HELLO was queued [99 bytes] >server|<4>| HSK[0x84bd8]: CERTIFICATE was queued [2867 bytes] >server|<4>| HSK[0x84bd8]: signing handshake data: using RSA-SHA1 >server|<4>| HSK[0x84bd8]: SERVER KEY EXCHANGE was queued [1331 bytes] >server|<4>| HSK[0x84bd8]: CERTIFICATE REQUEST was queued [18 bytes] >server|<4>| HSK[0x84bd8]: SERVER HELLO DONE was queued [12 bytes] >server|<6>| Session timeout: 168026 ms >server|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/dtls.c[_dtls_transmit]:299 >server|<6>| DTLS[0x84bd8]: End of flight transmission. >server|<3>| ASSERT: /var/tmp/portage/net-libs/gnutls-3.5.18/work/gnutls-3.5.18/lib/handshake.c[handshake_server]:3301 >client: Resource temporarily unavailable, try again. >server: The operation timed out >dtls_try_with_key_mtu:160: dtls_try_with_key_mtu:160: Handshake failed >FAIL dtls-repro-20170915 (exit status: 1)
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 654918
:
529946
|
530034
|
530036
| 530054 |
570942
|
570944