[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Why did gnutls28 FTBFS on kfreebsd-*



Hi Andreas,

[Looks like Petr already figured this out, but I already wrote this, so
I'll share it anyway!]

On 09/11/13 16:48, Andreas Metzler wrote:
> gnutls28 3.2.6-1/experimental FTBFS on kfreebsd-*. This is
> unpreducible on falla, any ideas?

The same problem occurred on mips.  It looks like a race condition.

It was reproducible for me on kfreebsd-amd64 with some difficulty, and
I managed to get the attached pass.log and fail.log for comparison, with
debug=1 also set in tests/utils.c

The specific error seems to be:
+client: unexpected error: The operation timed out


> ============================================================================
> Testsuite summary for GnuTLS 3.2.6
> ============================================================================
> # TOTAL: 79
> # PASS:  76
> # SKIP:  2
> # XFAIL: 0
> # FAIL:  1
> # XPASS: 0
> # ERROR: 0
> ============================================================================
> See tests/test-suite.log

It might be a good idea to echo that log file out into the build log.
Some packages do this unconditionally during build, some examples:
http://codesearch.debian.net/search?q=cat.*test-suite\.log

Regards,
-- 
Steven Chamberlain
steven@pyro.eu.org
server|<4>| REC[0x61b520]: Allocating epoch #0
client|<4>| REC[0x61b520]: Allocating epoch #0
server|<2>| ASSERT: gnutls_constate.c:581
server|<4>| REC[0x61b520]: Allocating epoch #1
server|<2>| ASSERT: gnutls_buffers.c:1018
client|<2>| ASSERT: gnutls_constate.c:581
client|<4>| REC[0x61b520]: Allocating epoch #1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_256_CBC_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_ARCFOUR_128_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_256_CBC_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_ARCFOUR_128_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_3DES_EDE_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_ARCFOUR_128_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_ARCFOUR_128_MD5
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
client|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_AES_128_CBC_SHA1 (C0.18)
client|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_AES_256_CBC_SHA1 (C0.19)
client|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_3DES_EDE_CBC_SHA1 (C0.17)
client|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_ARCFOUR_128_SHA1 (C0.16)
client|<3>| EXT[0x61b520]: Sending extension STATUS REQUEST (5 bytes)
client|<3>| EXT[0x61b520]: Sending extension SAFE RENEGOTIATION (1 bytes)
client|<3>| EXT[0x61b520]: Sending extension SESSION TICKET (0 bytes)
client|<3>| EXT[0x61b520]: Sending extension SUPPORTED ECC (12 bytes)
client|<3>| EXT[0x61b520]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
client|<3>| EXT[0x61b520]: sent signature algo (4.1) RSA-SHA256
client|<3>| EXT[0x61b520]: sent signature algo (4.2) DSA-SHA256
client|<3>| EXT[0x61b520]: sent signature algo (4.3) ECDSA-SHA256
client|<3>| EXT[0x61b520]: sent signature algo (5.1) RSA-SHA384
client|<3>| EXT[0x61b520]: sent signature algo (5.3) ECDSA-SHA384
client|<3>| EXT[0x61b520]: sent signature algo (6.1) RSA-SHA512
client|<3>| EXT[0x61b520]: sent signature algo (6.3) ECDSA-SHA512
client|<3>| EXT[0x61b520]: sent signature algo (3.1) RSA-SHA224
client|<3>| EXT[0x61b520]: sent signature algo (3.2) DSA-SHA224
client|<3>| EXT[0x61b520]: sent signature algo (3.3) ECDSA-SHA224
client|<3>| EXT[0x61b520]: sent signature algo (2.1) RSA-SHA1
client|<3>| EXT[0x61b520]: sent signature algo (2.2) DSA-SHA1
client|<3>| EXT[0x61b520]: sent signature algo (2.3) ECDSA-SHA1
client|<3>| EXT[0x61b520]: Sending extension SIGNATURE ALGORITHMS (28 bytes)
client|<3>| HSK[0x61b520]: CLIENT HELLO was queued [125 bytes]
client|<7>| HWRITE: enqueued [CLIENT HELLO] 125. Total 125 bytes.
client|<7>| HWRITE FLUSH: 125 bytes in buffer.
client|<4>| REC[0x61b520]: Preparing Packet Handshake(22) with length: 125 and min pad: 0
client|<9>| ENC[0x61b520]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
client|<7>| WRITE: enqueued 130 bytes for 0x4. Total 130 bytes.
client|<4>| REC[0x61b520]: Sent Packet[1] Handshake(22) in epoch 0 and length: 130
client|<7>| HWRITE: wrote 1 bytes, 0 bytes left.
client|<7>| WRITE FLUSH: 130 bytes in buffer.
client|<7>| WRITE: wrote 130 bytes, 0 bytes left.
client|<2>| ASSERT: gnutls_buffers.c:1018
server|<7>| READ: Got 5 bytes from 0x3
server|<7>| READ: read 5 bytes from 0x3
server|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
server|<7>| RB: Requested 5 bytes
server|<4>| REC[0x61b520]: SSL 3.0 Handshake packet received. Epoch 0, length: 125
server|<4>| REC[0x61b520]: Expected Packet Handshake(22)
server|<4>| REC[0x61b520]: Received Packet Handshake(22) with length: 125
server|<7>| READ: Got 125 bytes from 0x3
server|<7>| READ: read 125 bytes from 0x3
server|<7>| RB: Have 5 bytes into buffer. Adding 125 bytes.
server|<7>| RB: Requested 130 bytes
server|<4>| REC[0x61b520]: Decrypted Packet[0] Handshake(22) with length: 125
server|<6>| BUF[REC]: Inserted 125 bytes of Data(22)
server|<3>| HSK[0x61b520]: CLIENT HELLO (1) was received. Length 121[121], frag offset 0, frag length: 121, sequence: 0
server|<3>| HSK[0x61b520]: Client's version: 3.3
server|<2>| ASSERT: gnutls_db.c:266
server|<3>| EXT[0x61b520]: Found extension 'STATUS REQUEST/5'
server|<3>| EXT[0x61b520]: Found extension 'SAFE RENEGOTIATION/65281'
server|<3>| EXT[0x61b520]: Found extension 'SESSION TICKET/35'
server|<3>| EXT[0x61b520]: Found extension 'SUPPORTED ECC/10'
server|<3>| EXT[0x61b520]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
server|<3>| EXT[0x61b520]: Found extension 'SIGNATURE ALGORITHMS/13'
server|<3>| EXT[0x61b520]: Found extension 'STATUS REQUEST/5'
server|<3>| EXT[0x61b520]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
server|<3>| EXT[0x61b520]: Parsing extension 'SESSION TICKET/35' (0 bytes)
server|<3>| EXT[0x61b520]: Found extension 'SUPPORTED ECC/10'
server|<3>| EXT[0x61b520]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
server|<3>| EXT[0x61b520]: Found extension 'SIGNATURE ALGORITHMS/13'
server|<3>| EXT[0x61b520]: Parsing extension 'STATUS REQUEST/5' (5 bytes)
server|<3>| EXT[0x61b520]: Found extension 'SAFE RENEGOTIATION/65281'
server|<3>| EXT[0x61b520]: Found extension 'SESSION TICKET/35'
server|<3>| EXT[0x61b520]: Parsing extension 'SUPPORTED ECC/10' (12 bytes)
server|<3>| HSK[0x61b520]: Selected ECC curve SECP192R1 (5)
server|<3>| EXT[0x61b520]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes)
server|<3>| EXT[0x61b520]: Parsing extension 'SIGNATURE ALGORITHMS/13' (28 bytes)
server|<3>| EXT[0x61b520]: rcvd signature algo (4.1) RSA-SHA256
server|<3>| EXT[0x61b520]: rcvd signature algo (4.2) DSA-SHA256
server|<3>| EXT[0x61b520]: rcvd signature algo (4.3) ECDSA-SHA256
server|<3>| EXT[0x61b520]: rcvd signature algo (5.1) RSA-SHA384
server|<3>| EXT[0x61b520]: rcvd signature algo (5.3) ECDSA-SHA384
server|<3>| EXT[0x61b520]: rcvd signature algo (6.1) RSA-SHA512
server|<3>| EXT[0x61b520]: rcvd signature algo (6.3) ECDSA-SHA512
server|<3>| EXT[0x61b520]: rcvd signature algo (3.1) RSA-SHA224
server|<3>| EXT[0x61b520]: rcvd signature algo (3.2) DSA-SHA224
server|<3>| EXT[0x61b520]: rcvd signature algo (3.3) ECDSA-SHA224
server|<3>| EXT[0x61b520]: rcvd signature algo (2.1) RSA-SHA1
server|<3>| EXT[0x61b520]: rcvd signature algo (2.2) DSA-SHA1
server|<3>| EXT[0x61b520]: rcvd signature algo (2.3) ECDSA-SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_256_CBC_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_ARCFOUR_128_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_256_CBC_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_ARCFOUR_128_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_256_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_3DES_EDE_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_ARCFOUR_128_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_ARCFOUR_128_MD5
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
server|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_AES_128_CBC_SHA1 (C0.18)
server|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_AES_256_CBC_SHA1 (C0.19)
server|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_3DES_EDE_CBC_SHA1 (C0.17)
server|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_ARCFOUR_128_SHA1 (C0.16)
server|<3>| HSK[0x61b520]: Requested cipher suites[size: 8]:
server|<3>|     0xc0, 0x18 ECDH_ANON_AES_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Selected cipher suite: ECDH_ANON_AES_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Selected Compression Method: NULL
server|<3>| HSK[0x61b520]: Safe renegotiation succeeded
server|<2>| ASSERT: status_request.c:194
server|<3>| EXT[0x61b520]: Sending extension SAFE RENEGOTIATION (1 bytes)
server|<3>| EXT[0x61b520]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
server|<3>| HSK[0x61b520]: SessionID: e108b683afac2f17f97e1fc4fccfb182a8dc5d3995950242c0eba95dc3c2bd3a
server|<3>| HSK[0x61b520]: SERVER HELLO was queued [87 bytes]
server|<7>| HWRITE: enqueued [SERVER HELLO] 87. Total 87 bytes.
server|<3>| HSK[0x61b520]: SERVER KEY EXCHANGE was queued [57 bytes]
server|<7>| HWRITE: enqueued [SERVER KEY EXCHANGE] 57. Total 144 bytes.
server|<3>| HSK[0x61b520]: SERVER HELLO DONE was queued [4 bytes]
server|<7>| HWRITE: enqueued [SERVER HELLO DONE] 4. Total 148 bytes.
server|<7>| HWRITE FLUSH: 148 bytes in buffer.
server|<4>| REC[0x61b520]: Preparing Packet Handshake(22) with length: 87 and min pad: 0
server|<9>| ENC[0x61b520]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
server|<7>| WRITE: enqueued 92 bytes for 0x3. Total 92 bytes.
server|<4>| REC[0x61b520]: Sent Packet[1] Handshake(22) in epoch 0 and length: 92
server|<7>| HWRITE: wrote 1 bytes, 61 bytes left.
server|<4>| REC[0x61b520]: Preparing Packet Handshake(22) with length: 57 and min pad: 0
server|<9>| ENC[0x61b520]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
server|<7>| WRITE: enqueued 62 bytes for 0x3. Total 154 bytes.
server|<4>| REC[0x61b520]: Sent Packet[2] Handshake(22) in epoch 0 and length: 62
server|<7>| HWRITE: wrote 1 bytes, 4 bytes left.
server|<4>| REC[0x61b520]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
server|<9>| ENC[0x61b520]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
server|<7>| WRITE: enqueued 9 bytes for 0x3. Total 163 bytes.
server|<4>| REC[0x61b520]: Sent Packet[3] Handshake(22) in epoch 0 and length: 9
server|<7>| HWRITE: wrote 1 bytes, 0 bytes left.
server|<7>| WRITE FLUSH: 163 bytes in buffer.
server|<7>| WRITE: wrote 163 bytes, 0 bytes left.
server|<2>| ASSERT: gnutls_buffers.c:1018
client|<7>| READ: Got 5 bytes from 0x4
client|<7>| READ: read 5 bytes from 0x4
client|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
client|<7>| RB: Requested 5 bytes
client|<4>| REC[0x61b520]: SSL 3.3 Handshake packet received. Epoch 0, length: 87
client|<4>| REC[0x61b520]: Expected Packet Handshake(22)
client|<4>| REC[0x61b520]: Received Packet Handshake(22) with length: 87
client|<7>| READ: Got 87 bytes from 0x4
client|<7>| READ: read 87 bytes from 0x4
client|<7>| RB: Have 5 bytes into buffer. Adding 87 bytes.
client|<7>| RB: Requested 92 bytes
client|<4>| REC[0x61b520]: Decrypted Packet[0] Handshake(22) with length: 87
client|<6>| BUF[REC]: Inserted 87 bytes of Data(22)
client|<3>| HSK[0x61b520]: SERVER HELLO (2) was received. Length 83[83], frag offset 0, frag length: 83, sequence: 0
client|<3>| HSK[0x61b520]: Server's version: 3.3
client|<3>| HSK[0x61b520]: SessionID length: 32
client|<3>| HSK[0x61b520]: SessionID: e108b683afac2f17f97e1fc4fccfb182a8dc5d3995950242c0eba95dc3c2bd3a
client|<3>| HSK[0x61b520]: Selected cipher suite: ECDH_ANON_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Selected compression method: NULL (0)
client|<3>| EXT[0x61b520]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
client|<3>| EXT[0x61b520]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes)
client|<3>| HSK[0x61b520]: Safe renegotiation succeeded
client|<2>| ASSERT: gnutls_buffers.c:1018
client|<7>| READ: Got 5 bytes from 0x4
client|<7>| READ: read 5 bytes from 0x4
client|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
client|<7>| RB: Requested 5 bytes
client|<4>| REC[0x61b520]: SSL 3.3 Handshake packet received. Epoch 0, length: 57
client|<4>| REC[0x61b520]: Expected Packet Handshake(22)
client|<4>| REC[0x61b520]: Received Packet Handshake(22) with length: 57
client|<7>| READ: Got 57 bytes from 0x4
client|<7>| READ: read 57 bytes from 0x4
client|<7>| RB: Have 5 bytes into buffer. Adding 57 bytes.
client|<7>| RB: Requested 62 bytes
client|<4>| REC[0x61b520]: Decrypted Packet[1] Handshake(22) with length: 57
client|<6>| BUF[REC]: Inserted 57 bytes of Data(22)
client|<3>| HSK[0x61b520]: SERVER KEY EXCHANGE (12) was received. Length 53[53], frag offset 0, frag length: 53, sequence: 0
client|<3>| HSK[0x61b520]: Selected ECC curve SECP192R1 (5)
client|<2>| ASSERT: gnutls_buffers.c:1018
client|<7>| READ: Got 5 bytes from 0x4
client|<7>| READ: read 5 bytes from 0x4
client|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
client|<7>| RB: Requested 5 bytes
client|<4>| REC[0x61b520]: SSL 3.3 Handshake packet received. Epoch 0, length: 4
client|<4>| REC[0x61b520]: Expected Packet Handshake(22)
client|<4>| REC[0x61b520]: Received Packet Handshake(22) with length: 4
client|<7>| READ: Got 4 bytes from 0x4
client|<7>| READ: read 4 bytes from 0x4
client|<7>| RB: Have 5 bytes into buffer. Adding 4 bytes.
client|<7>| RB: Requested 9 bytes
client|<4>| REC[0x61b520]: Decrypted Packet[2] Handshake(22) with length: 4
client|<6>| BUF[REC]: Inserted 4 bytes of Data(22)
client|<3>| HSK[0x61b520]: SERVER HELLO DONE (14) was received. Length 0[0], frag offset 0, frag length: 1, sequence: 0
client|<3>| HSK[0x61b520]: CLIENT KEY EXCHANGE was queued [54 bytes]
client|<7>| HWRITE: enqueued [CLIENT KEY EXCHANGE] 54. Total 54 bytes.
client|<7>| HWRITE: enqueued [CHANGE CIPHER SPEC] 1. Total 55 bytes.
client|<3>| REC[0x61b520]: Sent ChangeCipherSpec
client|<9>| INT: PREMASTER SECRET[24]: 27f02d64c6f952d159c2ddf3aad79fd60dbfc57174e39df6
client|<9>| INT: CLIENT RANDOM[32]: 527e78ddf863739c0a195ee5b8d4263ddf0ca8d8fddb5820465a5658c7b22553
client|<9>| INT: SERVER RANDOM[32]: 527e78dd79e84874535fa51d6b8f38d1786aa842c9165dd691abd7a42d9f0c55
client|<9>| INT: MASTER SECRET: 2ec99932a927a40ac3c323970ea1dc75bf201d6c5793929fbb3ec4594c9c460b22a2d1b4660e0267537ed288eaef40a9
client|<4>| REC[0x61b520]: Initializing epoch #1
client|<9>| INT: KEY BLOCK[104]: 98c73aba52c1c5eccf81e8f47f0eaf5d29aaca49b45897a12d194feb620fce15
client|<9>| INT: CLIENT WRITE KEY [16]: 6f0059a030a112f8d27d2cbe1f548e2a
client|<9>| INT: SERVER WRITE KEY [16]: f4ce15fce251992040d6e69a9a11bc20
client|<4>| REC[0x61b520]: Epoch #1 ready
client|<3>| HSK[0x61b520]: Cipher Suite: ECDH_ANON_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Initializing internal [write] cipher sessions
client|<3>| HSK[0x61b520]: recording tls-unique CB (send)
client|<3>| HSK[0x61b520]: FINISHED was queued [16 bytes]
client|<7>| HWRITE: enqueued [FINISHED] 16. Total 71 bytes.
client|<7>| HWRITE FLUSH: 71 bytes in buffer.
client|<4>| REC[0x61b520]: Preparing Packet Handshake(22) with length: 54 and min pad: 0
client|<9>| ENC[0x61b520]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
client|<7>| WRITE: enqueued 59 bytes for 0x4. Total 59 bytes.
client|<4>| REC[0x61b520]: Sent Packet[2] Handshake(22) in epoch 0 and length: 59
client|<7>| HWRITE: wrote 1 bytes, 17 bytes left.
client|<4>| REC[0x61b520]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
client|<9>| ENC[0x61b520]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
client|<7>| WRITE: enqueued 6 bytes for 0x4. Total 65 bytes.
client|<4>| REC[0x61b520]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 6
client|<7>| HWRITE: wrote 1 bytes, 16 bytes left.
client|<4>| REC[0x61b520]: Preparing Packet Handshake(22) with length: 16 and min pad: 0
client|<9>| ENC[0x61b520]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
client|<2>| ASSERT: mac.c:253
client|<7>| WRITE: enqueued 69 bytes for 0x4. Total 134 bytes.
client|<4>| REC[0x61b520]: Sent Packet[1] Handshake(22) in epoch 1 and length: 69
client|<7>| HWRITE: wrote 1 bytes, 0 bytes left.
client|<7>| WRITE FLUSH: 134 bytes in buffer.
client|<7>| WRITE: wrote 134 bytes, 0 bytes left.
server|<7>| READ: Got 5 bytes from 0x3
server|<7>| READ: read 5 bytes from 0x3
server|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
server|<7>| RB: Requested 5 bytes
server|<4>| REC[0x61b520]: SSL 3.3 Handshake packet received. Epoch 0, length: 54
server|<4>| REC[0x61b520]: Expected Packet Handshake(22)
server|<4>| REC[0x61b520]: Received Packet Handshake(22) with length: 54
server|<7>| READ: Got 54 bytes from 0x3
server|<7>| READ: read 54 bytes from 0x3
server|<7>| RB: Have 5 bytes into buffer. Adding 54 bytes.
server|<7>| RB: Requested 59 bytes
server|<4>| REC[0x61b520]: Decrypted Packet[1] Handshake(22) with length: 54
server|<6>| BUF[REC]: Inserted 54 bytes of Data(22)
server|<3>| HSK[0x61b520]: CLIENT KEY EXCHANGE (16) was received. Length 50[50], frag offset 0, frag length: 50, sequence: 0
server|<7>| READ: Got 5 bytes from 0x3
server|<7>| READ: read 5 bytes from 0x3
server|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
server|<7>| RB: Requested 5 bytes
server|<4>| REC[0x61b520]: SSL 3.3 ChangeCipherSpec packet received. Epoch 0, length: 1
server|<4>| REC[0x61b520]: Expected Packet ChangeCipherSpec(20)
server|<4>| REC[0x61b520]: Received Packet ChangeCipherSpec(20) with length: 1
server|<7>| READ: Got 1 bytes from 0x3
server|<7>| READ: read 1 bytes from 0x3
server|<7>| RB: Have 5 bytes into buffer. Adding 1 bytes.
server|<7>| RB: Requested 6 bytes
server|<4>| REC[0x61b520]: Decrypted Packet[2] ChangeCipherSpec(20) with length: 1
server|<6>| BUF[REC]: Inserted 1 bytes of Data(20)
server|<9>| INT: PREMASTER SECRET[24]: 27f02d64c6f952d159c2ddf3aad79fd60dbfc57174e39df6
server|<9>| INT: CLIENT RANDOM[32]: 527e78ddf863739c0a195ee5b8d4263ddf0ca8d8fddb5820465a5658c7b22553
server|<9>| INT: SERVER RANDOM[32]: 527e78dd79e84874535fa51d6b8f38d1786aa842c9165dd691abd7a42d9f0c55
server|<9>| INT: MASTER SECRET: 2ec99932a927a40ac3c323970ea1dc75bf201d6c5793929fbb3ec4594c9c460b22a2d1b4660e0267537ed288eaef40a9
server|<4>| REC[0x61b520]: Initializing epoch #1
server|<9>| INT: KEY BLOCK[104]: 98c73aba52c1c5eccf81e8f47f0eaf5d29aaca49b45897a12d194feb620fce15
server|<9>| INT: CLIENT WRITE KEY [16]: 6f0059a030a112f8d27d2cbe1f548e2a
server|<9>| INT: SERVER WRITE KEY [16]: f4ce15fce251992040d6e69a9a11bc20
server|<4>| REC[0x61b520]: Epoch #1 ready
server|<3>| HSK[0x61b520]: Cipher Suite: ECDH_ANON_AES_128_CBC_SHA1
server|<2>| ASSERT: gnutls_buffers.c:1018
server|<7>| READ: Got 5 bytes from 0x3
server|<7>| READ: read 5 bytes from 0x3
server|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
server|<7>| RB: Requested 5 bytes
server|<4>| REC[0x61b520]: SSL 3.3 Handshake packet received. Epoch 0, length: 64
server|<4>| REC[0x61b520]: Expected Packet Handshake(22)
server|<4>| REC[0x61b520]: Received Packet Handshake(22) with length: 64
server|<7>| READ: Got 64 bytes from 0x3
server|<7>| READ: read 64 bytes from 0x3
server|<7>| RB: Have 5 bytes into buffer. Adding 64 bytes.
server|<7>| RB: Requested 69 bytes
server|<2>| ASSERT: mac.c:253
server|<4>| REC[0x61b520]: Decrypted Packet[0] Handshake(22) with length: 16
server|<6>| BUF[REC]: Inserted 16 bytes of Data(22)
server|<3>| HSK[0x61b520]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
server|<3>| HSK[0x61b520]: recording tls-unique CB (recv)
server|<7>| HWRITE: enqueued [CHANGE CIPHER SPEC] 1. Total 1 bytes.
server|<3>| REC[0x61b520]: Sent ChangeCipherSpec
server|<3>| HSK[0x61b520]: Cipher Suite: ECDH_ANON_AES_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Initializing internal [write] cipher sessions
server|<3>| HSK[0x61b520]: FINISHED was queued [16 bytes]
server|<7>| HWRITE: enqueued [FINISHED] 16. Total 17 bytes.
server|<7>| HWRITE FLUSH: 17 bytes in buffer.
server|<4>| REC[0x61b520]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
server|<9>| ENC[0x61b520]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
server|<7>| WRITE: enqueued 6 bytes for 0x3. Total 6 bytes.
server|<4>| REC[0x61b520]: Sent Packet[4] ChangeCipherSpec(20) in epoch 0 and length: 6
server|<7>| HWRITE: wrote 1 bytes, 16 bytes left.
server|<4>| REC[0x61b520]: Preparing Packet Handshake(22) with length: 16 and min pad: 0
server|<9>| ENC[0x61b520]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
server|<2>| ASSERT: mac.c:253
server|<7>| WRITE: enqueued 69 bytes for 0x3. Total 75 bytes.
server|<4>| REC[0x61b520]: Sent Packet[1] Handshake(22) in epoch 1 and length: 69
server|<7>| HWRITE: wrote 1 bytes, 0 bytes left.
server|<7>| WRITE FLUSH: 75 bytes in buffer.
server|<7>| WRITE: wrote 75 bytes, 0 bytes left.
server|<4>| REC[0x61b520]: Start of epoch cleanup
server|<4>| REC[0x61b520]: Epoch #0 freed
server|<4>| REC[0x61b520]: End of epoch cleanup
server|<7>| WRITE FLUSH: 0 bytes in buffer.
server|<2>| ASSERT: gnutls_buffers.c:613
client|<7>| READ: Got 5 bytes from 0x4
client|<7>| READ: read 5 bytes from 0x4
client|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
client|<7>| RB: Requested 5 bytes
client|<4>| REC[0x61b520]: SSL 3.3 ChangeCipherSpec packet received. Epoch 0, length: 1
client|<4>| REC[0x61b520]: Expected Packet ChangeCipherSpec(20)
server|<4>| REC: Sending Alert[1|0] - Close notify
client|<4>| REC[0x61b520]: Received Packet ChangeCipherSpec(20) with length: 1
server|<4>| REC[0x61b520]: Preparing Packet Alert(21) with length: 2 and min pad: 0
server|<9>| ENC[0x61b520]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
client|<7>| READ: Got 1 bytes from 0x4
client|<7>| READ: read 1 bytes from 0x4
client|<7>| RB: Have 5 bytes into buffer. Adding 1 bytes.
client|<7>| RB: Requested 6 bytes
client|<4>| REC[0x61b520]: Decrypted Packet[3] ChangeCipherSpec(20) with length: 1
client|<6>| BUF[REC]: Inserted 1 bytes of Data(20)
client|<3>| HSK[0x61b520]: Cipher Suite: ECDH_ANON_AES_128_CBC_SHA1
client|<2>| ASSERT: gnutls_buffers.c:1018
client|<7>| READ: Got 5 bytes from 0x4
client|<7>| READ: read 5 bytes from 0x4
server|<2>| ASSERT: mac.c:253
client|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
client|<7>| RB: Requested 5 bytes
client|<4>| REC[0x61b520]: SSL 3.3 Handshake packet received. Epoch 0, length: 64
client|<4>| REC[0x61b520]: Expected Packet Handshake(22)
client|<4>| REC[0x61b520]: Received Packet Handshake(22) with length: 64
server|<7>| WRITE: enqueued 53 bytes for 0x3. Total 53 bytes.
client|<7>| READ: Got 64 bytes from 0x4
server|<7>| WRITE FLUSH: 53 bytes in buffer.
server|<7>| WRITE: wrote 53 bytes, 0 bytes left.
server|<4>| REC[0x61b520]: Sent Packet[2] Alert(21) in epoch 1 and length: 53
client|<7>| READ: read 64 bytes from 0x4
client|<7>| RB: Have 5 bytes into buffer. Adding 64 bytes.
client|<7>| RB: Requested 69 bytes
client|<2>| ASSERT: mac.c:253
client|<4>| REC[0x61b520]: Decrypted Packet[0] Handshake(22) with length: 16
client|<6>| BUF[REC]: Inserted 16 bytes of Data(22)
client|<3>| HSK[0x61b520]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
client|<4>| REC[0x61b520]: Start of epoch cleanup
client|<4>| REC[0x61b520]: Epoch #0 freed
client|<4>| REC[0x61b520]: End of epoch cleanup
client|<4>| REC[0x61b520]: Start of epoch cleanup
client|<4>| REC[0x61b520]: End of epoch cleanup
client|<4>| REC[0x61b520]: Epoch #1 freed
client|<7>| WRITE FLUSH: 0 bytes in buffer.
client|<2>| ASSERT: gnutls_buffers.c:613
client|<4>| REC: Sending Alert[1|0] - Close notify
client|<2>| ASSERT: gnutls_constate.c:581
client|<2>| ASSERT: gnutls_record.c:461
client|<2>| ASSERT: gnutls_record.c:318
server|<7>| READ: Got 0 bytes from 0x3
server|<7>| READ: read 0 bytes from 0x3
server|<2>| ASSERT: gnutls_buffers.c:515
server|<2>| ASSERT: gnutls_record.c:1048
server|<2>| ASSERT: gnutls_record.c:1160
server|<2>| ASSERT: gnutls_record.c:1321
server|<4>| REC[0x61b520]: Start of epoch cleanup
server|<4>| REC[0x61b520]: End of epoch cleanup
server|<4>| REC[0x61b520]: Epoch #1 freed

Will test timeout
server|<4>| REC[0x61b520]: Allocating epoch #0
client|<4>| REC[0x61b520]: Allocating epoch #0
client|<2>| ASSERT: gnutls_constate.c:581
client|<4>| REC[0x61b520]: Allocating epoch #1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_256_CBC_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_ARCFOUR_128_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_256_CBC_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_ARCFOUR_128_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_3DES_EDE_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_ARCFOUR_128_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_ARCFOUR_128_MD5
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
client|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_AES_128_CBC_SHA1 (C0.18)
client|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_AES_256_CBC_SHA1 (C0.19)
client|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_3DES_EDE_CBC_SHA1 (C0.17)
client|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_ARCFOUR_128_SHA1 (C0.16)
client|<3>| EXT[0x61b520]: Sending extension STATUS REQUEST (5 bytes)
client|<3>| EXT[0x61b520]: Sending extension SAFE RENEGOTIATION (1 bytes)
client|<3>| EXT[0x61b520]: Sending extension SESSION TICKET (0 bytes)
client|<3>| EXT[0x61b520]: Sending extension SUPPORTED ECC (12 bytes)
client|<3>| EXT[0x61b520]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
client|<3>| EXT[0x61b520]: sent signature algo (4.1) RSA-SHA256
client|<3>| EXT[0x61b520]: sent signature algo (4.2) DSA-SHA256
client|<3>| EXT[0x61b520]: sent signature algo (4.3) ECDSA-SHA256
client|<3>| EXT[0x61b520]: sent signature algo (5.1) RSA-SHA384
client|<3>| EXT[0x61b520]: sent signature algo (5.3) ECDSA-SHA384
client|<3>| EXT[0x61b520]: sent signature algo (6.1) RSA-SHA512
client|<3>| EXT[0x61b520]: sent signature algo (6.3) ECDSA-SHA512
client|<3>| EXT[0x61b520]: sent signature algo (3.1) RSA-SHA224
client|<3>| EXT[0x61b520]: sent signature algo (3.2) DSA-SHA224
client|<3>| EXT[0x61b520]: sent signature algo (3.3) ECDSA-SHA224
client|<3>| EXT[0x61b520]: sent signature algo (2.1) RSA-SHA1
client|<3>| EXT[0x61b520]: sent signature algo (2.2) DSA-SHA1
client|<3>| EXT[0x61b520]: sent signature algo (2.3) ECDSA-SHA1
client|<3>| EXT[0x61b520]: Sending extension SIGNATURE ALGORITHMS (28 bytes)
client|<3>| HSK[0x61b520]: CLIENT HELLO was queued [125 bytes]
client|<7>| HWRITE: enqueued [CLIENT HELLO] 125. Total 125 bytes.
client|<7>| HWRITE FLUSH: 125 bytes in buffer.
client|<4>| REC[0x61b520]: Preparing Packet Handshake(22) with length: 125 and min pad: 0
client|<9>| ENC[0x61b520]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
client|<7>| WRITE: enqueued 130 bytes for 0x4. Total 130 bytes.
client|<4>| REC[0x61b520]: Sent Packet[1] Handshake(22) in epoch 0 and length: 130
client|<7>| HWRITE: wrote 1 bytes, 0 bytes left.
client|<7>| WRITE FLUSH: 130 bytes in buffer.
client|<7>| WRITE: wrote 130 bytes, 0 bytes left.
client|<2>| ASSERT: gnutls_buffers.c:1018

client|<2>| ASSERT: gnutls_buffers.c:288
client|<2>| ASSERT: gnutls_buffers.c:511
client|<2>| ASSERT: gnutls_record.c:1048
client|<2>| ASSERT: gnutls_record.c:1160
client|<2>| ASSERT: gnutls_buffers.c:1228
client|<2>| ASSERT: gnutls_handshake.c:1409
client|<2>| ASSERT: gnutls_handshake.c:2701
client|<4>| REC[0x61b520]: Start of epoch cleanup
client|<4>| REC[0x61b520]: End of epoch cleanup
client|<4>| REC[0x61b520]: Epoch #0 freed
client|<4>| REC[0x61b520]: Epoch #1 freed
client: expected timeout occured
server|<4>| REC[0x61b520]: Start of epoch cleanup
server|<4>| REC[0x61b520]: End of epoch cleanup
server|<4>| REC[0x61b520]: Epoch #0 freed
Self test `./mini-handshake-timeout' finished with 0 errors
0.01user 0.01system 0:20.02elapsed 0%CPU (16avgtext+532avgdata 2688maxresident)k
0inputs+0outputs (0major+397minor)pagefaults 0swaps
PASS
server|<4>| REC[0x61b520]: Allocating epoch #0
server|<2>| ASSERT: gnutls_constate.c:581
server|<4>| REC[0x61b520]: Allocating epoch #1
server|<2>| ASSERT: gnutls_buffers.c:1018
client|<4>| REC[0x61b520]: Allocating epoch #0
client|<2>| ASSERT: gnutls_constate.c:581
client|<4>| REC[0x61b520]: Allocating epoch #1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_256_CBC_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_ARCFOUR_128_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_256_CBC_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_ARCFOUR_128_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_3DES_EDE_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_ARCFOUR_128_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_ARCFOUR_128_MD5
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_GCM_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_GCM_SHA384
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA256
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
client|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
client|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_AES_128_CBC_SHA1 (C0.18)
client|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_AES_256_CBC_SHA1 (C0.19)
client|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_3DES_EDE_CBC_SHA1 (C0.17)
client|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_ARCFOUR_128_SHA1 (C0.16)
client|<3>| EXT[0x61b520]: Sending extension STATUS REQUEST (5 bytes)
client|<3>| EXT[0x61b520]: Sending extension SAFE RENEGOTIATION (1 bytes)
client|<3>| EXT[0x61b520]: Sending extension SESSION TICKET (0 bytes)
client|<3>| EXT[0x61b520]: Sending extension SUPPORTED ECC (12 bytes)
client|<3>| EXT[0x61b520]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
client|<3>| EXT[0x61b520]: sent signature algo (4.1) RSA-SHA256
client|<3>| EXT[0x61b520]: sent signature algo (4.2) DSA-SHA256
client|<3>| EXT[0x61b520]: sent signature algo (4.3) ECDSA-SHA256
client|<3>| EXT[0x61b520]: sent signature algo (5.1) RSA-SHA384
client|<3>| EXT[0x61b520]: sent signature algo (5.3) ECDSA-SHA384
client|<3>| EXT[0x61b520]: sent signature algo (6.1) RSA-SHA512
client|<3>| EXT[0x61b520]: sent signature algo (6.3) ECDSA-SHA512
client|<3>| EXT[0x61b520]: sent signature algo (3.1) RSA-SHA224
client|<3>| EXT[0x61b520]: sent signature algo (3.2) DSA-SHA224
client|<3>| EXT[0x61b520]: sent signature algo (3.3) ECDSA-SHA224
client|<3>| EXT[0x61b520]: sent signature algo (2.1) RSA-SHA1
client|<3>| EXT[0x61b520]: sent signature algo (2.2) DSA-SHA1
client|<3>| EXT[0x61b520]: sent signature algo (2.3) ECDSA-SHA1
client|<3>| EXT[0x61b520]: Sending extension SIGNATURE ALGORITHMS (28 bytes)
client|<3>| HSK[0x61b520]: CLIENT HELLO was queued [125 bytes]
client|<7>| HWRITE: enqueued [CLIENT HELLO] 125. Total 125 bytes.
client|<7>| HWRITE FLUSH: 125 bytes in buffer.
client|<4>| REC[0x61b520]: Preparing Packet Handshake(22) with length: 125 and min pad: 0
client|<9>| ENC[0x61b520]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
client|<7>| WRITE: enqueued 130 bytes for 0x4. Total 130 bytes.
client|<4>| REC[0x61b520]: Sent Packet[1] Handshake(22) in epoch 0 and length: 130
client|<7>| HWRITE: wrote 1 bytes, 0 bytes left.
client|<7>| WRITE FLUSH: 130 bytes in buffer.
client|<7>| WRITE: wrote 130 bytes, 0 bytes left.
client|<2>| ASSERT: gnutls_buffers.c:1018
client|<2>| ASSERT: ./gnutls_handshake.h:69
client|<2>| ASSERT: gnutls_buffers.c:1220
client|<2>| ASSERT: gnutls_handshake.c:1409
client|<2>| ASSERT: gnutls_handshake.c:2701
client|<4>| REC[0x61b520]: Start of epoch cleanup
client|<4>| REC[0x61b520]: End of epoch cleanup
client|<4>| REC[0x61b520]: Epoch #0 freed
client|<4>| REC[0x61b520]: Epoch #1 freed
server|<7>| READ: Got 5 bytes from 0x3
server|<7>| READ: read 5 bytes from 0x3
server|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
server|<7>| RB: Requested 5 bytes
server|<4>| REC[0x61b520]: SSL 3.0 Handshake packet received. Epoch 0, length: 125
server|<4>| REC[0x61b520]: Expected Packet Handshake(22)
server|<4>| REC[0x61b520]: Received Packet Handshake(22) with length: 125
server|<7>| READ: Got 125 bytes from 0x3
server|<7>| READ: read 125 bytes from 0x3
server|<7>| RB: Have 5 bytes into buffer. Adding 125 bytes.
server|<7>| RB: Requested 130 bytes
server|<4>| REC[0x61b520]: Decrypted Packet[0] Handshake(22) with length: 125
server|<6>| BUF[REC]: Inserted 125 bytes of Data(22)
server|<3>| HSK[0x61b520]: CLIENT HELLO (1) was received. Length 121[121], frag offset 0, frag length: 121, sequence: 0
server|<3>| HSK[0x61b520]: Client's version: 3.3
server|<2>| ASSERT: gnutls_db.c:266
server|<3>| EXT[0x61b520]: Found extension 'STATUS REQUEST/5'
server|<3>| EXT[0x61b520]: Found extension 'SAFE RENEGOTIATION/65281'
server|<3>| EXT[0x61b520]: Found extension 'SESSION TICKET/35'
server|<3>| EXT[0x61b520]: Found extension 'SUPPORTED ECC/10'
server|<3>| EXT[0x61b520]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
server|<3>| EXT[0x61b520]: Found extension 'SIGNATURE ALGORITHMS/13'
server|<3>| EXT[0x61b520]: Found extension 'STATUS REQUEST/5'
server|<3>| EXT[0x61b520]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
client: unexpected error: The operation timed out
server|<3>| EXT[0x61b520]: Parsing extension 'SESSION TICKET/35' (0 bytes)
server|<3>| EXT[0x61b520]: Found extension 'SUPPORTED ECC/10'
server|<3>| EXT[0x61b520]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
server|<3>| EXT[0x61b520]: Found extension 'SIGNATURE ALGORITHMS/13'
server|<3>| EXT[0x61b520]: Parsing extension 'STATUS REQUEST/5' (5 bytes)
server|<3>| EXT[0x61b520]: Found extension 'SAFE RENEGOTIATION/65281'
server|<3>| EXT[0x61b520]: Found extension 'SESSION TICKET/35'
server|<3>| EXT[0x61b520]: Parsing extension 'SUPPORTED ECC/10' (12 bytes)
server|<3>| HSK[0x61b520]: Selected ECC curve SECP192R1 (5)
server|<3>| EXT[0x61b520]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes)
server|<3>| EXT[0x61b520]: Parsing extension 'SIGNATURE ALGORITHMS/13' (28 bytes)
server|<3>| EXT[0x61b520]: rcvd signature algo (4.1) RSA-SHA256
server|<3>| EXT[0x61b520]: rcvd signature algo (4.2) DSA-SHA256
server|<3>| EXT[0x61b520]: rcvd signature algo (4.3) ECDSA-SHA256
server|<3>| EXT[0x61b520]: rcvd signature algo (5.1) RSA-SHA384
server|<3>| EXT[0x61b520]: rcvd signature algo (5.3) ECDSA-SHA384
server|<3>| EXT[0x61b520]: rcvd signature algo (6.1) RSA-SHA512
server|<3>| EXT[0x61b520]: rcvd signature algo (6.3) ECDSA-SHA512
server|<3>| EXT[0x61b520]: rcvd signature algo (3.1) RSA-SHA224
server|<3>| EChild died with status 1
XT[0x61b520]: rcvd signature algo (3.2) DSA-SHA224
server|<3>| EXT[0x61b520]: rcvd signature algo (3.3) ECDSA-SHA224
server|<3>| EXT[0x61b520]: rcvd signature algo (2.1) RSA-SHA1
server|<3>| EXT[0x61b520]: rcvd signature algo (2.2) DSA-SHA1
server|<3>| EXT[0x61b520]: rcvd signature algo (2.3) ECDSA-SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_256_CBC_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_ECDSA_ARCFOUR_128_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_CAMELLIA_256_CBC_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: ECDHE_RSA_ARCFOUR_128_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_AES_256_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_3DES_EDE_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_ARCFOUR_128_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: RSA_ARCFOUR_128_MD5
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_GCM_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_GCM_SHA384
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA256
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
server|<3>| HSK[0x61b520]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
server|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_AES_128_CBC_SHA1 (C0.18)
server|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_AES_256_CBC_SHA1 (C0.19)
server|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_3DES_EDE_CBC_SHA1 (C0.17)
server|<3>| HSK[0x61b520]: Keeping ciphersuite: ECDH_ANON_ARCFOUR_128_SHA1 (C0.16)
server|<3>| HSK[0x61b520]: Requested cipher suites[size: 8]:
server|<3>|     0xc0, 0x18 ECDH_ANON_AES_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Selected cipher suite: ECDH_ANON_AES_128_CBC_SHA1
server|<3>| HSK[0x61b520]: Selected Compression Method: NULL
server|<3>| HSK[0x61b520]: Safe renegotiation succeeded
server|<2>| ASSERT: status_request.c:194
server|<3>| EXT[0x61b520]: Sending extension SAFE RENEGOTIATION (1 bytes)
server|<3>| EXT[0x61b520]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
server|<3>| HSK[0x61b520]: SessionID: 805df93ec4f5c4ad66d8b863fd72c64d6faf74e056d297927ac26b2d42c7107f
server|<3>| HSK[0x61b520]: SERVER HELLO was queued [87 bytes]
server|<7>| HWRITE: enqueued [SERVER HELLO] 87. Total 87 bytes.
server|<3>| HSK[0x61b520]: SERVER KEY EXCHANGE was queued [57 bytes]
server|<7>| HWRITE: enqueued [SERVER KEY EXCHANGE] 57. Total 144 bytes.
server|<3>| HSK[0x61b520]: SERVER HELLO DONE was queued [4 bytes]
server|<7>| HWRITE: enqueued [SERVER HELLO DONE] 4. Total 148 bytes.
server|<7>| HWRITE FLUSH: 148 bytes in buffer.
server|<4>| REC[0x61b520]: Preparing Packet Handshake(22) with length: 87 and min pad: 0
server|<9>| ENC[0x61b520]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
server|<7>| WRITE: enqueued 92 bytes for 0x3. Total 92 bytes.
server|<4>| REC[0x61b520]: Sent Packet[1] Handshake(22) in epoch 0 and length: 92
server|<7>| HWRITE: wrote 1 bytes, 61 bytes left.
server|<4>| REC[0x61b520]: Preparing Packet Handshake(22) with length: 57 and min pad: 0
server|<9>| ENC[0x61b520]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
server|<7>| WRITE: enqueued 62 bytes for 0x3. Total 154 bytes.
server|<4>| REC[0x61b520]: Sent Packet[2] Handshake(22) in epoch 0 and length: 62
server|<7>| HWRITE: wrote 1 bytes, 4 bytes left.
server|<4>| REC[0x61b520]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
server|<9>| ENC[0x61b520]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
server|<7>| WRITE: enqueued 9 bytes for 0x3. Total 163 bytes.
server|<4>| REC[0x61b520]: Sent Packet[3] Handshake(22) in epoch 0 and length: 9
server|<7>| HWRITE: wrote 1 bytes, 0 bytes left.
server|<7>| WRITE FLUSH: 163 bytes in buffer.
Command terminated by signal 13
0.00user 0.00system 3:11.18elapsed 0%CPU (0avgtext+0avgdata 2040maxresident)k
0inputs+0outputs (0major+263minor)pagefaults 0swaps
FAIL

Reply to: