Hi Andreas, In a future upload please could you try the attached diff, which is a much simpler way I found to get the testsuite output into the build log. Since more than one set of tests runs in parallel, we only currently see the test-suite.log for one set of tests, and not all of them.
> On Sat, 2016-03-05 at 17:30 +0100, Andreas Metzler wrote: > > Well with 3.4.10 the timeout does not seem to make any difference. > > Any of > > > > gnutls_dtls_set_timeouts(session, 1 * 1000, 29 * 1000); [Steven's > > patch] Your commit to the gnutls28 package in experimental https://anonscm.debian.org/cgit/pkg-gnutls/gnutls.git/commit/?h=experimental&id=896b247a321271ab61ed1fce5065cadbd472c207 seems to do the opposite of my patch, it increases the server timeout? My patch decreased it: https://bugs.debian.org/813598#5 > > gnutls_dtls_set_timeouts(session, 1 * 1000, 30 * 1000); [3.4.10] > > gnutls_dtls_set_timeouts(session, 1 * 1000, 29 * 1000); > > [e6dcb14dbbd3e9e40a1f193a7bf6657e82b88cb9] > > *always* fails on kfreebsd-amd64. If it fails _reliably_ now, I consider that an improvement! I'll try to test all of the above and see how often each one fails. Nikos Mavrogiannopoulos wrote: > It would be nice to have some debugging output of the failed test > (e.g., run with -v). Is that a 32-bit system? I'm wondering whether it > relates to the undefined behavior fixes. I've also attached a log of `tests/mini-loss-time -v`, from a kfreebsd-amd64 system after I built Andreas' gnutls28/3.4.10-1 package from experimental. Thanks, Regards, -- Steven Chamberlain ste...@pyro.eu.org
--- debian/rules.orig 2016-03-05 07:16:57.000000000 +0000 +++ debian/rules 2016-03-05 12:53:20.231986977 +0000 @@ -106,12 +106,7 @@ dh_strip --ddeb-migration='libgnutls30-dbg (<< 3.4.7-2~)' override_dh_auto_test: - dh_auto_test -O--parallel || touch dh_auto_test.fail - @if test -e dh_auto_test.fail ; then \ - find -name test-suite.log | \ - while read i ; do \ - echo "----dh_auto_test.fail" ; echo $$i ; echo ---- ; \ - cat $$i ; echo ; done ; rm -f dh_auto_test.fail; false; fi + dh_auto_test -O--parallel -- VERBOSE=1 override_dh_clean: dh_clean -X.bak
0.000020 0.141000 Will discard server packet 2 0.141029 client|<5>| REC[0x621b20]: Allocating epoch #0 0.141044 client|<3>| ASSERT: gnutls_constate.c:596 0.141057 client|<5>| REC[0x621b20]: Allocating epoch #1 0.141070 server|<5>| REC[0x621b20]: Allocating epoch #0 0.141084 client|<4>| HSK[0x621b20]: Keeping ciphersuite: GNUTLS_ECDH_ANON_AES_128_CBC_SHA1 (C0.18) 0.141098 client|<4>| HSK[0x621b20]: Keeping ciphersuite: GNUTLS_ECDH_ANON_AES_256_CBC_SHA1 (C0.19) 0.141111 client|<4>| HSK[0x621b20]: Keeping ciphersuite: GNUTLS_ECDH_ANON_3DES_EDE_CBC_SHA1 (C0.17) 0.141124 client|<4>| EXT[0x621b20]: Sending extension EXT MASTER SECRET (0 bytes) 0.141137 client|<4>| EXT[0x621b20]: Sending extension STATUS REQUEST (5 bytes) 0.141150 client|<4>| EXT[0x621b20]: Sending extension SAFE RENEGOTIATION (1 bytes) 0.141163 client|<4>| EXT[0x621b20]: Sending extension SESSION TICKET (0 bytes) 0.141177 client|<4>| EXT[0x621b20]: Sending extension SUPPORTED ECC (12 bytes) 0.141191 client|<4>| EXT[0x621b20]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes) 0.141204 client|<4>| HSK[0x621b20]: CLIENT HELLO was queued [104 bytes] 0.141217 client|<11>| HWRITE: enqueued [CLIENT HELLO] 104. Total 104 bytes. 0.141236 client|<11>| HWRITE FLUSH: 104 bytes in buffer. 0.141250 client|<6>| DTLS[0x621b20]: Start of flight transmission. 0.141263 client|<6>| DTLS[0x621b20]: Sending Packet[0] fragment CLIENT HELLO(1) with length: 92, offset: 0, fragment length: 92 0.141277 client|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 104 and min pad: 0 0.141291 client|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 0.141304 server|<3>| ASSERT: gnutls_constate.c:596 0.141316 client|<11>| WRITE: enqueued 117 bytes for 0x5. Total 117 bytes. 0.141329 server|<5>| REC[0x621b20]: Allocating epoch #1 0.141342 client|<5>| REC[0x621b20]: Sent Packet[1] Handshake(22) in epoch 0 and length: 117 0.141355 client|<11>| WRITE FLUSH: 117 bytes in buffer. 0.141369 client|<11>| WRITE: wrote 117 bytes, 0 bytes left. 0.141389 server|<3>| ASSERT: gnutls_buffers.c:1158 0.141405 server|<10>| READ: Got 117 bytes from 0x4 0.141423 server|<10>| READ: read 117 bytes from 0x4 0.141436 server|<10>| RB: Have 0 bytes into buffer. Adding 117 bytes. 0.141449 server|<10>| RB: Requested 13 bytes 0.141469 server|<5>| REC[0x621b20]: SSL 254.255 Handshake packet received. Epoch 0, length: 104 0.141482 server|<5>| REC[0x621b20]: Expected Packet Handshake(22) 0.141496 server|<5>| REC[0x621b20]: Received Packet Handshake(22) with length: 104 0.141509 server|<5>| REC[0x621b20]: Decrypted Packet[0.0] Handshake(22) with length: 104 0.141522 server|<13>| BUF[REC]: Inserted 104 bytes of Data(22) 0.141534 server|<4>| HSK[0x621b20]: CLIENT HELLO (1) was received. Length 92[92], frag offset 0, frag length: 92, sequence: 0 0.141547 server|<4>| HSK[0x621b20]: Client's version: 254.255 0.141560 server|<4>| HSK[0x621b20]: Selected version DTLS1.0 0.141574 server|<3>| ASSERT: gnutls_db.c:263 0.141586 server|<4>| EXT[0x621b20]: Found extension 'EXT MASTER SECRET/23' 0.141600 server|<4>| EXT[0x621b20]: Found extension 'STATUS REQUEST/5' 0.141615 server|<4>| EXT[0x621b20]: Found extension 'SAFE RENEGOTIATION/65281' 0.141628 server|<4>| EXT[0x621b20]: Found extension 'SESSION TICKET/35' 0.141641 server|<4>| EXT[0x621b20]: Found extension 'SUPPORTED ECC/10' 0.141654 server|<4>| EXT[0x621b20]: Found extension 'SUPPORTED ECC POINT FORMATS/11' 0.141672 server|<4>| EXT[0x621b20]: Parsing extension 'EXT MASTER SECRET/23' (0 bytes) 0.141685 server|<4>| EXT[0x621b20]: Found extension 'STATUS REQUEST/5' 0.141698 server|<4>| EXT[0x621b20]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes) 0.141712 server|<4>| EXT[0x621b20]: Parsing extension 'SESSION TICKET/35' (0 bytes) 0.141725 server|<4>| EXT[0x621b20]: Found extension 'SUPPORTED ECC/10' 0.141738 server|<4>| EXT[0x621b20]: Found extension 'SUPPORTED ECC POINT FORMATS/11' 0.141750 server|<4>| EXT[0x621b20]: Found extension 'EXT MASTER SECRET/23' 0.141763 server|<4>| EXT[0x621b20]: Parsing extension 'STATUS REQUEST/5' (5 bytes) 0.141776 server|<4>| EXT[0x621b20]: Found extension 'SAFE RENEGOTIATION/65281' 0.141862 server|<4>| EXT[0x621b20]: Found extension 'SESSION TICKET/35' 0.141936 server|<4>| EXT[0x621b20]: Parsing extension 'SUPPORTED ECC/10' (12 bytes) 0.141951 server|<4>| HSK[0x621b20]: Selected ECC curve SECP256R1 (2) 0.141964 server|<4>| EXT[0x621b20]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes) 0.141977 server|<4>| HSK[0x621b20]: Keeping ciphersuite: GNUTLS_ECDH_ANON_AES_128_CBC_SHA1 (C0.18) 0.141991 server|<4>| HSK[0x621b20]: Keeping ciphersuite: GNUTLS_ECDH_ANON_AES_256_CBC_SHA1 (C0.19) 0.142003 server|<4>| HSK[0x621b20]: Keeping ciphersuite: GNUTLS_ECDH_ANON_3DES_EDE_CBC_SHA1 (C0.17) 0.142016 server|<4>| HSK[0x621b20]: Requested cipher suites[size: 6]: 0.142029 server|<4>| 0xc0, 0x18 ECDH_ANON_AES_128_CBC_SHA1 0.142042 server|<4>| HSK[0x621b20]: Selected cipher suite: ECDH_ANON_AES_128_CBC_SHA1 0.142055 server|<4>| HSK[0x621b20]: Selected Compression Method: NULL 0.142068 server|<4>| HSK[0x621b20]: Safe renegotiation succeeded 0.142080 server|<4>| EXT[0x621b20]: Sending extension EXT MASTER SECRET (0 bytes) 0.142093 server|<3>| ASSERT: status_request.c:215 0.142105 server|<4>| EXT[0x621b20]: Sending extension SAFE RENEGOTIATION (1 bytes) 0.142118 server|<4>| EXT[0x621b20]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes) 0.142131 server|<4>| HSK[0x621b20]: SessionID: 24a5fefe8afb4aa2d197cc025b49579abe5c93323e7d90cb04d19af4dd59ef98 0.142143 server|<4>| HSK[0x621b20]: SERVER HELLO was queued [99 bytes] 0.142156 server|<11>| HWRITE: enqueued [SERVER HELLO] 99. Total 99 bytes. 0.142168 server|<4>| HSK[0x621b20]: SERVER KEY EXCHANGE was queued [81 bytes] 0.142181 server|<11>| HWRITE: enqueued [SERVER KEY EXCHANGE] 81. Total 180 bytes. 0.142194 server|<4>| HSK[0x621b20]: SERVER HELLO DONE was queued [12 bytes] 0.142206 server|<11>| HWRITE: enqueued [SERVER HELLO DONE] 12. Total 192 bytes. 0.142219 server|<11>| HWRITE FLUSH: 192 bytes in buffer. 0.142232 server|<6>| DTLS[0x621b20]: Start of flight transmission. 0.142245 server|<6>| DTLS[0x621b20]: Sending Packet[0] fragment SERVER HELLO(2) with length: 87, offset: 0, fragment length: 87 0.142258 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 99 and min pad: 0 0.142271 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 0.142284 server|<11>| WRITE: enqueued 112 bytes for 0x4. Total 112 bytes. 0.142296 server|<5>| REC[0x621b20]: Sent Packet[1] Handshake(22) in epoch 0 and length: 112 0.142309 server|<6>| DTLS[0x621b20]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 69, offset: 0, fragment length: 69 0.142324 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 81 and min pad: 0 0.142337 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 0.142349 server|<11>| WRITE: enqueued 94 bytes for 0x4. Total 206 bytes. 0.142362 server|<5>| REC[0x621b20]: Sent Packet[2] Handshake(22) in epoch 0 and length: 94 0.142375 server|<6>| DTLS[0x621b20]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0 0.142387 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 12 and min pad: 0 0.142400 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 0.142412 server|<11>| WRITE: enqueued 25 bytes for 0x4. Total 231 bytes. 0.142426 server|<5>| REC[0x621b20]: Sent Packet[3] Handshake(22) in epoch 0 and length: 25 0.142439 server|<11>| WRITE FLUSH: 231 bytes in buffer. 0.142452 Discarding packet 2: Server Key exchange 0.142470 Discarding packet 1: Server Hello Done 0.142483 server|<11>| WRITE: wrote 231 bytes, 0 bytes left. 0.142495 client|<10>| READ: Got 112 bytes from 0x5 0.142508 client|<10>| READ: read 112 bytes from 0x5 0.142521 client|<10>| RB: Have 0 bytes into buffer. Adding 112 bytes. 0.142533 client|<10>| RB: Requested 13 bytes 0.142549 client|<5>| REC[0x621b20]: SSL 254.255 Handshake packet received. Epoch 0, length: 99 0.142562 client|<5>| REC[0x621b20]: Expected Packet Handshake(22) 0.142575 client|<5>| REC[0x621b20]: Received Packet Handshake(22) with length: 99 0.142588 client|<5>| REC[0x621b20]: Decrypted Packet[0.0] Handshake(22) with length: 99 0.142600 client|<13>| BUF[REC]: Inserted 99 bytes of Data(22) 0.142613 client|<4>| HSK[0x621b20]: SERVER HELLO (2) was received. Length 87[87], frag offset 0, frag length: 87, sequence: 0 0.142635 client|<6>| DTLS[0x621b20]: End of flight transmission. 0.142649 client|<3>| ASSERT: gnutls_buffers.c:1115 0.142661 client|<3>| ASSERT: gnutls_buffers.c:1374 0.142674 client|<3>| ASSERT: gnutls_buffers.c:1374 0.142687 client|<4>| HSK[0x621b20]: Server's version: 254.255 0.142699 client|<4>| HSK[0x621b20]: SessionID length: 32 0.142712 client|<4>| HSK[0x621b20]: SessionID: 24a5fefe8afb4aa2d197cc025b49579abe5c93323e7d90cb04d19af4dd59ef98 0.142725 client|<4>| HSK[0x621b20]: Selected cipher suite: ECDH_ANON_AES_128_CBC_SHA1 0.142738 client|<4>| HSK[0x621b20]: Selected compression method: NULL (0) 0.142751 client|<4>| EXT[0x621b20]: Parsing extension 'EXT MASTER SECRET/23' (0 bytes) 0.142763 client|<4>| EXT[0x621b20]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes) 0.142776 client|<4>| EXT[0x621b20]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes) 0.142789 client|<4>| HSK[0x621b20]: Safe renegotiation succeeded 0.142801 client|<3>| ASSERT: gnutls_buffers.c:1158 1.020882 server|<6>| DTLS[0x621b20]: re-Start of flight transmission. 1.021037 server|<6>| DTLS[0x621b20]: Sending Packet[0] fragment SERVER HELLO(2) with length: 87, offset: 0, fragment length: 87 1.021136 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 99 and min pad: 0 1.021150 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 1.021165 server|<11>| WRITE: enqueued 112 bytes for 0x4. Total 112 bytes. 1.021178 server|<5>| REC[0x621b20]: Sent Packet[4] Handshake(22) in epoch 0 and length: 112 1.021192 server|<6>| DTLS[0x621b20]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 69, offset: 0, fragment length: 69 1.021205 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 81 and min pad: 0 1.021219 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 1.021232 server|<11>| WRITE: enqueued 94 bytes for 0x4. Total 206 bytes. 1.021245 server|<5>| REC[0x621b20]: Sent Packet[5] Handshake(22) in epoch 0 and length: 94 1.021259 server|<6>| DTLS[0x621b20]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0 1.021273 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 12 and min pad: 0 1.021287 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 1.021300 server|<11>| WRITE: enqueued 25 bytes for 0x4. Total 231 bytes. 1.021313 server|<5>| REC[0x621b20]: Sent Packet[6] Handshake(22) in epoch 0 and length: 25 1.021326 server|<11>| WRITE FLUSH: 231 bytes in buffer. 1.021339 Discarding packet 1: Server Hello 1.021354 Discarding packet 1: Server Key exchange 1.021367 Discarding packet 1: Server Hello Done 1.021379 server|<11>| WRITE: wrote 231 bytes, 0 bytes left. 2.025506 server|<11>| WRITE FLUSH: 0 bytes in buffer. 2.025634 server|<3>| ASSERT: gnutls_buffers.c:695 4.034434 server|<6>| DTLS[0x621b20]: re-Start of flight transmission. 4.034562 server|<6>| DTLS[0x621b20]: Sending Packet[0] fragment SERVER HELLO(2) with length: 87, offset: 0, fragment length: 87 4.034581 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 99 and min pad: 0 4.034597 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 4.034610 server|<11>| WRITE: enqueued 112 bytes for 0x4. Total 112 bytes. 4.034622 server|<5>| REC[0x621b20]: Sent Packet[7] Handshake(22) in epoch 0 and length: 112 4.034635 server|<6>| DTLS[0x621b20]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 69, offset: 0, fragment length: 69 4.034648 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 81 and min pad: 0 4.034661 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 4.034673 server|<11>| WRITE: enqueued 94 bytes for 0x4. Total 206 bytes. 4.034686 server|<5>| REC[0x621b20]: Sent Packet[8] Handshake(22) in epoch 0 and length: 94 4.034701 server|<6>| DTLS[0x621b20]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0 4.034714 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 12 and min pad: 0 4.034727 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 4.034741 server|<11>| WRITE: enqueued 25 bytes for 0x4. Total 231 bytes. 4.034754 server|<5>| REC[0x621b20]: Sent Packet[9] Handshake(22) in epoch 0 and length: 25 4.034767 server|<11>| WRITE FLUSH: 231 bytes in buffer. 4.034789 Discarding packet 1: Server Hello 4.034805 Discarding packet 1: Server Key exchange 4.034818 Discarding packet 1: Server Hello Done 4.034832 server|<11>| WRITE: wrote 231 bytes, 0 bytes left. 6.035732 server|<11>| WRITE FLUSH: 0 bytes in buffer. 6.035850 server|<3>| ASSERT: gnutls_buffers.c:695 10.051089 server|<6>| DTLS[0x621b20]: re-Start of flight transmission. 10.051208 server|<6>| DTLS[0x621b20]: Sending Packet[0] fragment SERVER HELLO(2) with length: 87, offset: 0, fragment length: 87 10.051223 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 99 and min pad: 0 10.051237 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 10.051250 server|<11>| WRITE: enqueued 112 bytes for 0x4. Total 112 bytes. 10.051262 server|<5>| REC[0x621b20]: Sent Packet[10] Handshake(22) in epoch 0 and length: 112 10.051275 server|<6>| DTLS[0x621b20]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 69, offset: 0, fragment length: 69 10.051288 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 81 and min pad: 0 10.051301 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 10.051314 server|<11>| WRITE: enqueued 94 bytes for 0x4. Total 206 bytes. 10.051327 server|<5>| REC[0x621b20]: Sent Packet[11] Handshake(22) in epoch 0 and length: 94 10.051340 server|<6>| DTLS[0x621b20]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0 10.051353 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 12 and min pad: 0 10.051366 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 10.051379 server|<11>| WRITE: enqueued 25 bytes for 0x4. Total 231 bytes. 10.051392 server|<5>| REC[0x621b20]: Sent Packet[12] Handshake(22) in epoch 0 and length: 25 10.051405 server|<11>| WRITE FLUSH: 231 bytes in buffer. 10.051418 Discarding packet 1: Server Hello 10.051431 Discarding packet 1: Server Key exchange 10.051444 Discarding packet 1: Server Hello Done 10.051465 server|<11>| WRITE: wrote 231 bytes, 0 bytes left. 14.056767 server|<11>| WRITE FLUSH: 0 bytes in buffer. 14.056890 server|<3>| ASSERT: gnutls_buffers.c:695 22.065525 server|<6>| DTLS[0x621b20]: re-Start of flight transmission. 22.065645 server|<6>| DTLS[0x621b20]: Sending Packet[0] fragment SERVER HELLO(2) with length: 87, offset: 0, fragment length: 87 22.065665 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 99 and min pad: 0 22.065679 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 22.065692 server|<11>| WRITE: enqueued 112 bytes for 0x4. Total 112 bytes. 22.065705 server|<5>| REC[0x621b20]: Sent Packet[13] Handshake(22) in epoch 0 and length: 112 22.065718 server|<6>| DTLS[0x621b20]: Sending Packet[1] fragment SERVER KEY EXCHANGE(12) with length: 69, offset: 0, fragment length: 69 22.065731 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 81 and min pad: 0 22.065743 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 22.065756 server|<11>| WRITE: enqueued 94 bytes for 0x4. Total 206 bytes. 22.065769 server|<5>| REC[0x621b20]: Sent Packet[14] Handshake(22) in epoch 0 and length: 94 22.065781 server|<6>| DTLS[0x621b20]: Sending Packet[2] fragment SERVER HELLO DONE(14) with length: 0, offset: 0, fragment length: 0 22.065795 server|<5>| REC[0x621b20]: Preparing Packet Handshake(22) with length: 12 and min pad: 0 22.065808 server|<9>| ENC[0x621b20]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 22.065821 server|<11>| WRITE: enqueued 25 bytes for 0x4. Total 231 bytes. 22.065834 server|<5>| REC[0x621b20]: Sent Packet[15] Handshake(22) in epoch 0 and length: 25 22.065848 server|<11>| WRITE FLUSH: 231 bytes in buffer. 22.065861 Discarding packet 1: Server Hello 22.065875 Discarding packet 1: Server Key exchange 22.065887 Discarding packet 1: Server Hello Done 22.065900 server|<11>| WRITE: wrote 231 bytes, 0 bytes left. 30.067663 server|<6>| Session timeout: 30102 ms 30.067793 server|<3>| ASSERT: gnutls_dtls.c:294 30.067812 server|<6>| DTLS[0x621b20]: End of flight transmission. 30.067826 server|<3>| ASSERT: gnutls_handshake.c:3193 30.067839 server|<5>| REC[0x621b20]: Start of epoch cleanup 30.067852 server|<5>| REC[0x621b20]: End of epoch cleanup 30.067865 server|<5>| REC[0x621b20]: Epoch #0 freed 30.067878 server|<5>| REC[0x621b20]: Epoch #1 freed 30.067890 server received timeout 30.068681 client|<10>| READ_TIMEOUT: -1 returned from 0x5, errno=4 (timeout: 31000) 30.068747 client|<3>| ASSERT: gnutls_buffers.c:252 30.068760 client|<3>| ASSERT: gnutls_buffers.c:588 30.068776 client|<3>| ASSERT: gnutls_kx.c:463 30.122652 client|<3>| ASSERT: gnutls_buffers.c:1158 30.122731 client|<10>| READ: -1 returned from 0x5, errno=54 30.122749 client|<3>| ASSERT: gnutls_buffers.c:228 30.122764 client|<3>| ASSERT: gnutls_buffers.c:588 30.122777 client|<3>| ASSERT: gnutls_record.c:1038 30.122790 client|<3>| ASSERT: gnutls_record.c:1158 30.122803 client|<3>| ASSERT: gnutls_buffers.c:1409 30.122816 client|<3>| ASSERT: gnutls_handshake.c:1446 30.122829 client|<3>| ASSERT: gnutls_kx.c:463 30.122841 client|<3>| ASSERT: gnutls_handshake.c:2798 30.122854 client|<5>| REC[0x621b20]: Start of epoch cleanup 30.122867 client|<5>| REC[0x621b20]: End of epoch cleanup 30.122881 client|<5>| REC[0x621b20]: Epoch #0 freed 30.122911 client|<5>| REC[0x621b20]: Epoch #1 freed 30.122928 client: Handshake failed with unexpected reason: Error in the push function.
signature.asc
Description: Digital signature