Advertisement
traxtopel

Untitled

Mar 6th, 2024
46
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 20.99 KB | None | 0 0
  1. ERROR: Esys_Sign: tpm:parameter(1):structure is the wrong size
  2. SSL connection failure: PKCS #11 error.
  3.  
  4. ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59
  5. ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59
  6. ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59
  7. ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59
  8. ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59
  9. ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59
  10. GET https://testvpn.com
  11. Attempting to connect to server [2000:100:2000:1009::7]:443
  12. Connected to [2000:100:2000:1009::7]:443
  13. Initializing needed PKCS #11 modules
  14. p11: Initializing module: p11-kit-trust
  15. p11: No login requested.
  16. p11 attrs: CKA_CLASS (CERT), CKA_CERTIFICATE_TYPE
  17. p11 attrs: CKA_TRUSTED
  18. p11 attrs: CKA_CERTIFICATE_CATEGORY=CA
  19. p11: No login requested.
  20. p11 attrs: CKA_CLASS (CERT), CKA_CERTIFICATE_TYPE
  21. p11 attrs: CKA_TRUSTED
  22. p11 attrs: CKA_CERTIFICATE_CATEGORY=CA
  23. ASSERT: ../../lib/pkcs11.c[find_multi_objs_cb]:3105
  24. ASSERT: ../../lib/pkcs11.c[gnutls_pkcs11_obj_list_import_url3]:3416
  25. Using certificate file usercert.pem
  26. Initializing all PKCS #11 modules
  27. WARNING:fapi:src/tss2-fapi/api/Fapi_List.c:226:Fapi_List_Finish() Profile of path not provisioned: /HS/SRK
  28. ERROR:fapi:src/tss2-fapi/api/Fapi_List.c:81:Fapi_List() ErrorCode (0x00060034) Entities_List
  29. WARNING: Listing FAPI token objects failed: "fapi:Provisioning was not executed."
  30. Please see https://github.com/tpm2-software/tpm2-pkcs11/blob/1.9.0/docs/FAPI.md for more details
  31. WARNING: Getting tokens from fapi backend failed.
  32. p11: Initializing module: p11-kit-trust
  33. p11: module p11-kit-trust is already loaded.
  34. ASSERT: ../../lib/pkcs11.c[auto_load]:958
  35. Cannot load PKCS #11 module: p11-kit-trust
  36. p11: Initializing module: opensc
  37. p11: Initializing module: softhsm2
  38. p11: Initializing module: tpm2_pkcs11
  39. ASSERT: ../../lib/pkcs11.c[compat_load]:906
  40. p11: Using pin-value to retrieve PIN
  41. p11: Login result = ok (0)
  42. Using PKCS#11 key pkcs11:model=%01%01%04%00%02%01%02%00%00%00%00%00%00%00%00%00;manufacturer=STMicro;serial=0000000000000000;token=TL_ECC256;id=%36%66%62%66%33%66%30%61%36%32%39%31%35%65%39%00;object=KL_ECC256;type=private?pin-value=userpin
  43. Using client certificate 'Test User'
  44. ASSERT: ../../../lib/x509/x509.c[gnutls_x509_crt_get_authority_key_id]:1690
  45. Adding supporting CA 'ACME VPN Linux CA G2'
  46. ASSERT: ../../../lib/x509/x509_ext.c[gnutls_subject_alt_names_get]:111
  47. ASSERT: ../../../lib/x509/x509.c[get_alt_name]:2011
  48. cannot use privkey of EC/ECDSA with RSA-PSS-SHA256
  49. cannot use privkey of EC/ECDSA with RSA-PSS-RSAE-SHA256
  50. cannot use privkey of EC/ECDSA with RSA-PSS-SHA384
  51. cannot use privkey of EC/ECDSA with RSA-PSS-RSAE-SHA384
  52. cannot use privkey of EC/ECDSA with RSA-PSS-SHA512
  53. cannot use privkey of EC/ECDSA with RSA-PSS-RSAE-SHA512
  54. cannot use privkey of EC/ECDSA with EdDSA-Ed25519
  55. cannot use privkey of EC/ECDSA with EdDSA-Ed448
  56. REC[0x55fceb6c32d0]: Allocating epoch #0
  57. cfg: system priority /etc/crypto-policies/back-ends/gnutls.config has not changed
  58. cfg: finalized system-wide priority string
  59. resolved 'OPENCONNECT' to '', next 'SYSTEM'
  60. resolved 'SYSTEM' to 'NONE:+ECDHE-RSA:+ECDHE-ECDSA:+RSA:+DHE-RSA:+GROUP-X25519:+GROUP-SECP256R1:+GROUP-X448:+GROUP-SECP521R1:+GROUP-SECP384R1:+GROUP-FFDHE2048:+GROUP-FFDHE3072:+GROUP-FFDHE4096:+GROUP-FFDHE6144:+GROUP-FFDHE8192:+AES-256-GCM:+AES-256-CCM:+CHACHA20-POLY1305:+AES-256-CBC:+AES-128-GCM:+AES-128-CCM:+AES-128-CBC:+AEAD:+SHA1:+SHA512:+SIGN-ECDSA-SHA3-256:+SIGN-ECDSA-SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+SIGN-ECDSA-SHA3-384:+SIGN-ECDSA-SHA384:+SIGN-ECDSA-SECP384R1-SHA384:+SIGN-ECDSA-SHA3-512:+SIGN-ECDSA-SHA512:+SIGN-ECDSA-SECP521R1-SHA512:+SIGN-EdDSA-Ed25519:+SIGN-EdDSA-Ed448:+SIGN-RSA-PSS-SHA256:+SIGN-RSA-PSS-SHA384:+SIGN-RSA-PSS-SHA512:+SIGN-RSA-PSS-RSAE-SHA256:+SIGN-RSA-PSS-RSAE-SHA384:+SIGN-RSA-PSS-RSAE-SHA512:+SIGN-RSA-SHA3-256:+SIGN-RSA-SHA256:+SIGN-RSA-SHA3-384:+SIGN-RSA-SHA384:+SIGN-RSA-SHA3-512:+SIGN-RSA-SHA512:+SIGN-ECDSA-SHA224:+SIGN-RSA-SHA224:+SIGN-ECDSA-SHA3-224:+SIGN-RSA-SHA3-224:+VERS-TLS1.3:+VERS-TLS1.2:+VERS-DTLS1.2', next ''
  61. selected priority string: NONE:+ECDHE-RSA:+ECDHE-ECDSA:+RSA:+DHE-RSA:+GROUP-X25519:+GROUP-SECP256R1:+GROUP-X448:+GROUP-SECP521R1:+GROUP-SECP384R1:+GROUP-FFDHE2048:+GROUP-FFDHE3072:+GROUP-FFDHE4096:+GROUP-FFDHE6144:+GROUP-FFDHE8192:+AES-256-GCM:+AES-256-CCM:+CHACHA20-POLY1305:+AES-256-CBC:+AES-128-GCM:+AES-128-CCM:+AES-128-CBC:+AEAD:+SHA1:+SHA512:+SIGN-ECDSA-SHA3-256:+SIGN-ECDSA-SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+SIGN-ECDSA-SHA3-384:+SIGN-ECDSA-SHA384:+SIGN-ECDSA-SECP384R1-SHA384:+SIGN-ECDSA-SHA3-512:+SIGN-ECDSA-SHA512:+SIGN-ECDSA-SECP521R1-SHA512:+SIGN-EdDSA-Ed25519:+SIGN-EdDSA-Ed448:+SIGN-RSA-PSS-SHA256:+SIGN-RSA-PSS-SHA384:+SIGN-RSA-PSS-SHA512:+SIGN-RSA-PSS-RSAE-SHA256:+SIGN-RSA-PSS-RSAE-SHA384:+SIGN-RSA-PSS-RSAE-SHA512:+SIGN-RSA-SHA3-256:+SIGN-RSA-SHA256:+SIGN-RSA-SHA3-384:+SIGN-RSA-SHA384:+SIGN-RSA-SHA3-512:+SIGN-RSA-SHA512:+SIGN-ECDSA-SHA224:+SIGN-RSA-SHA224:+SIGN-ECDSA-SHA3-224:+SIGN-RSA-SHA3-224:+VERS-TLS1.3:+VERS-TLS1.2:+VERS-DTLS1.2:%COMPAT:-3DES-CBC:-ARCFOUR-128
  62. added 3 protocols, 29 ciphersuites, 17 sig algos and 10 groups into priority list
  63. SSL negotiation with testvpn.com
  64. REC[0x55fceb6c32d0]: Allocating epoch #1
  65. HSK[0x55fceb6c32d0]: Adv. version: 3.3
  66. Keeping ciphersuite 13.02 (GNUTLS_AES_256_GCM_SHA384)
  67. Keeping ciphersuite 13.03 (GNUTLS_CHACHA20_POLY1305_SHA256)
  68. Keeping ciphersuite 13.01 (GNUTLS_AES_128_GCM_SHA256)
  69. Keeping ciphersuite 13.04 (GNUTLS_AES_128_CCM_SHA256)
  70. Keeping ciphersuite c0.30 (GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384)
  71. Keeping ciphersuite cc.a8 (GNUTLS_ECDHE_RSA_CHACHA20_POLY1305)
  72. Keeping ciphersuite c0.14 (GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1)
  73. Keeping ciphersuite c0.2f (GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256)
  74. Keeping ciphersuite c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1)
  75. Keeping ciphersuite c0.2c (GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384)
  76. Keeping ciphersuite c0.ad (GNUTLS_ECDHE_ECDSA_AES_256_CCM)
  77. Keeping ciphersuite cc.a9 (GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305)
  78. Keeping ciphersuite c0.0a (GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1)
  79. Keeping ciphersuite c0.2b (GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256)
  80. Keeping ciphersuite c0.ac (GNUTLS_ECDHE_ECDSA_AES_128_CCM)
  81. Keeping ciphersuite c0.09 (GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1)
  82. Keeping ciphersuite 00.9d (GNUTLS_RSA_AES_256_GCM_SHA384)
  83. Keeping ciphersuite c0.9d (GNUTLS_RSA_AES_256_CCM)
  84. Keeping ciphersuite 00.35 (GNUTLS_RSA_AES_256_CBC_SHA1)
  85. Keeping ciphersuite 00.9c (GNUTLS_RSA_AES_128_GCM_SHA256)
  86. Keeping ciphersuite c0.9c (GNUTLS_RSA_AES_128_CCM)
  87. Keeping ciphersuite 00.2f (GNUTLS_RSA_AES_128_CBC_SHA1)
  88. Keeping ciphersuite 00.9f (GNUTLS_DHE_RSA_AES_256_GCM_SHA384)
  89. Keeping ciphersuite c0.9f (GNUTLS_DHE_RSA_AES_256_CCM)
  90. Keeping ciphersuite cc.aa (GNUTLS_DHE_RSA_CHACHA20_POLY1305)
  91. Keeping ciphersuite 00.39 (GNUTLS_DHE_RSA_AES_256_CBC_SHA1)
  92. Keeping ciphersuite 00.9e (GNUTLS_DHE_RSA_AES_128_GCM_SHA256)
  93. Keeping ciphersuite c0.9e (GNUTLS_DHE_RSA_AES_128_CCM)
  94. Keeping ciphersuite 00.33 (GNUTLS_DHE_RSA_AES_128_CBC_SHA1)
  95. EXT[0x55fceb6c32d0]: Preparing extension (Server Certificate Type/20) for 'client hello'
  96. EXT[0x55fceb6c32d0]: Preparing extension (Early Data/42) for 'client hello'
  97. EXT[0x55fceb6c32d0]: Preparing extension (Maximum Record Size/1) for 'client hello'
  98. EXT[0x55fceb6c32d0]: Preparing extension (Encrypt-then-MAC/22) for 'client hello'
  99. EXT[0x55fceb6c32d0]: Preparing extension (Session Ticket/35) for 'client hello'
  100. EXT[0x55fceb6c32d0]: Sending extension Session Ticket/35 (0 bytes)
  101. EXT[0x55fceb6c32d0]: Preparing extension (Supported Versions/43) for 'client hello'
  102. Advertizing version 3.4
  103. Advertizing version 3.3
  104. EXT[0x55fceb6c32d0]: Sending extension Supported Versions/43 (5 bytes)
  105. EXT[0x55fceb6c32d0]: Preparing extension (Key Share/51) for 'client hello'
  106. EXT[0x55fceb6c32d0]: sending key share for X25519
  107. EXT[0x55fceb6c32d0]: sending key share for SECP256R1
  108. ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59
  109. ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59
  110. EXT[0x55fceb6c32d0]: Sending extension Key Share/51 (107 bytes)
  111. EXT[0x55fceb6c32d0]: Preparing extension (Server Name Indication/0) for 'client hello'
  112. HSK[0x55fceb6c32d0]: sent server name: 'testvpn.com'
  113. EXT[0x55fceb6c32d0]: Sending extension Server Name Indication/0 (30 bytes)
  114. EXT[0x55fceb6c32d0]: Preparing extension (Supported Groups/10) for 'client hello'
  115. EXT[0x55fceb6c32d0]: Sent group X25519 (0x1d)
  116. EXT[0x55fceb6c32d0]: Sent group SECP256R1 (0x17)
  117. EXT[0x55fceb6c32d0]: Sent group X448 (0x1e)
  118. EXT[0x55fceb6c32d0]: Sent group SECP521R1 (0x19)
  119. EXT[0x55fceb6c32d0]: Sent group SECP384R1 (0x18)
  120. EXT[0x55fceb6c32d0]: Sent group FFDHE2048 (0x100)
  121. EXT[0x55fceb6c32d0]: Sent group FFDHE3072 (0x101)
  122. EXT[0x55fceb6c32d0]: Sent group FFDHE4096 (0x102)
  123. EXT[0x55fceb6c32d0]: Sent group FFDHE6144 (0x103)
  124. EXT[0x55fceb6c32d0]: Sent group FFDHE8192 (0x104)
  125. EXT[0x55fceb6c32d0]: Sending extension Supported Groups/10 (22 bytes)
  126. EXT[0x55fceb6c32d0]: Preparing extension (Supported EC Point Formats/11) for 'client hello'
  127. EXT[0x55fceb6c32d0]: Sending extension Supported EC Point Formats/11 (2 bytes)
  128. EXT[0x55fceb6c32d0]: Preparing extension (Client Certificate Type/19) for 'client hello'
  129. EXT[0x55fceb6c32d0]: Preparing extension (OCSP Status Request/5) for 'client hello'
  130. EXT[0x55fceb6c32d0]: Sending extension OCSP Status Request/5 (5 bytes)
  131. EXT[0x55fceb6c32d0]: Preparing extension (Signature Algorithms/13) for 'client hello'
  132. EXT[0x55fceb6c32d0]: sent signature algo (4.3) ECDSA-SHA256
  133. EXT[0x55fceb6c32d0]: sent signature algo (5.3) ECDSA-SHA384
  134. EXT[0x55fceb6c32d0]: sent signature algo (6.3) ECDSA-SHA512
  135. EXT[0x55fceb6c32d0]: sent signature algo (8.7) EdDSA-Ed25519
  136. EXT[0x55fceb6c32d0]: sent signature algo (8.8) EdDSA-Ed448
  137. EXT[0x55fceb6c32d0]: sent signature algo (8.9) RSA-PSS-SHA256
  138. EXT[0x55fceb6c32d0]: sent signature algo (8.10) RSA-PSS-SHA384
  139. EXT[0x55fceb6c32d0]: sent signature algo (8.11) RSA-PSS-SHA512
  140. EXT[0x55fceb6c32d0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256
  141. EXT[0x55fceb6c32d0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384
  142. EXT[0x55fceb6c32d0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512
  143. EXT[0x55fceb6c32d0]: sent signature algo (4.1) RSA-SHA256
  144. EXT[0x55fceb6c32d0]: sent signature algo (5.1) RSA-SHA384
  145. EXT[0x55fceb6c32d0]: sent signature algo (6.1) RSA-SHA512
  146. EXT[0x55fceb6c32d0]: Sending extension Signature Algorithms/13 (30 bytes)
  147. EXT[0x55fceb6c32d0]: Preparing extension (Record Size Limit/28) for 'client hello'
  148. EXT[0x55fceb6c32d0]: Sending extension Record Size Limit/28 (2 bytes)
  149. EXT[0x55fceb6c32d0]: Preparing extension (Post Handshake Auth/49) for 'client hello'
  150. EXT[0x55fceb6c32d0]: Preparing extension (Cookie/44) for 'client hello'
  151. EXT[0x55fceb6c32d0]: Preparing extension (Extended Master Secret/23) for 'client hello'
  152. EXT[0x55fceb6c32d0]: Preparing extension (SRTP/14) for 'client hello'
  153. EXT[0x55fceb6c32d0]: Preparing extension (Safe Renegotiation/65281) for 'client hello'
  154. EXT[0x55fceb6c32d0]: Sending extension Safe Renegotiation/65281 (1 bytes)
  155. EXT[0x55fceb6c32d0]: Preparing extension (Compress Certificate/27) for 'client hello'
  156. EXT[0x55fceb6c32d0]: Preparing extension (ALPN/16) for 'client hello'
  157. EXT[0x55fceb6c32d0]: Preparing extension (PSK Key Exchange Modes/45) for 'client hello'
  158. EXT[0x55fceb6c32d0]: Sending extension PSK Key Exchange Modes/45 (3 bytes)
  159. EXT[0x55fceb6c32d0]: Preparing extension (ClientHello Padding/21) for 'client hello'
  160. EXT[0x55fceb6c32d0]: Sending extension ClientHello Padding/21 (122 bytes)
  161. EXT[0x55fceb6c32d0]: Preparing extension (Pre Shared Key/41) for 'client hello'
  162. HSK[0x55fceb6c32d0]: CLIENT HELLO was queued [512 bytes]
  163. HWRITE: enqueued [CLIENT HELLO] 512. Total 512 bytes.
  164. HWRITE FLUSH: 512 bytes in buffer.
  165. REC[0x55fceb6c32d0]: Preparing Packet Handshake(22) with length: 512 and min pad: 0
  166. ENC[0x55fceb6c32d0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
  167. WRITE: enqueued 517 bytes for 0x6. Total 517 bytes.
  168. REC[0x55fceb6c32d0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 517
  169. HWRITE: wrote 1 bytes, 0 bytes left.
  170. WRITE FLUSH: 517 bytes in buffer.
  171. WRITE: wrote 517 bytes, 0 bytes left.
  172. ASSERT: ../../lib/buffers.c[get_last_packet]:1138
  173. READ: Got 5 bytes from 0x6
  174. READ: read 5 bytes from 0x6
  175. RB: Have 0 bytes into buffer. Adding 5 bytes.
  176. RB: Requested 5 bytes
  177. REC[0x55fceb6c32d0]: SSL 3.3 Handshake packet received. Epoch 0, length: 93
  178. REC[0x55fceb6c32d0]: Expected Packet Handshake(22)
  179. REC[0x55fceb6c32d0]: Received Packet Handshake(22) with length: 93
  180. READ: Got 93 bytes from 0x6
  181. READ: read 93 bytes from 0x6
  182. RB: Have 5 bytes into buffer. Adding 93 bytes.
  183. RB: Requested 98 bytes
  184. REC[0x55fceb6c32d0]: Decrypted Packet[0] Handshake(22) with length: 93
  185. BUF[REC]: Inserted 93 bytes of Data(22)
  186. HSK[0x55fceb6c32d0]: SERVER HELLO (2) was received. Length 89[89], frag offset 0, frag length: 89, sequence: 0
  187. ASSERT: ../../lib/buffers.c[get_last_packet]:1130
  188. ASSERT: ../../lib/buffers.c[_gnutls_handshake_io_recv_int]:1374
  189. HSK[0x55fceb6c32d0]: Server's version: 3.3
  190. HSK[0x55fceb6c32d0]: SessionID length: 32
  191. HSK[0x55fceb6c32d0]: SessionID: 08ddb4758ec18dd9bab36b42b8c68aea2e841cb2cd662885fe3d71875d459502
  192. HSK[0x55fceb6c32d0]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384
  193. EXT[0x55fceb6c32d0]: Parsing extension 'Server Name Indication/0' (0 bytes)
  194. EXT[0x55fceb6c32d0]: Parsing extension 'Safe Renegotiation/65281' (1 bytes)
  195. EXT[0x55fceb6c32d0]: Parsing extension 'Supported EC Point Formats/11' (4 bytes)
  196. HSK[0x55fceb6c32d0]: Safe renegotiation succeeded
  197. ASSERT: ../../lib/buffers.c[get_last_packet]:1138
  198. READ: Got 5 bytes from 0x6
  199. READ: read 5 bytes from 0x6
  200. RB: Have 0 bytes into buffer. Adding 5 bytes.
  201. RB: Requested 5 bytes
  202. REC[0x55fceb6c32d0]: SSL 3.3 Handshake packet received. Epoch 0, length: 4318
  203. REC[0x55fceb6c32d0]: Expected Packet Handshake(22)
  204. REC[0x55fceb6c32d0]: Received Packet Handshake(22) with length: 4318
  205. READ: Got 1231 bytes from 0x6
  206. READ: Got 2668 bytes from 0x6
  207. READ: Got 419 bytes from 0x6
  208. READ: read 4318 bytes from 0x6
  209. RB: Have 5 bytes into buffer. Adding 4318 bytes.
  210. RB: Requested 4323 bytes
  211. REC[0x55fceb6c32d0]: Decrypted Packet[1] Handshake(22) with length: 4318
  212. BUF[REC]: Inserted 4318 bytes of Data(22)
  213. HSK[0x55fceb6c32d0]: CERTIFICATE (11) was received. Length 4314[4314], frag offset 0, frag length: 4314, sequence: 0
  214. ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59
  215. ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59
  216. ASSERT: ../../lib/ocsp-api.c[gnutls_ocsp_status_request_get2]:96
  217. ASSERT: ../../lib/ocsp-api.c[gnutls_ocsp_status_request_get2]:96
  218. ASSERT: ../../lib/ocsp-api.c[gnutls_ocsp_status_request_get2]:96
  219. ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59
  220. ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59
  221. self-signed cert found: subject `CN=ACME Internal Root CA,O=ACME,C=US', issuer `CN=ACME Internal Root CA,O=ACME,C=US', serial 0x14, RSA key 2048 bits, signed using RSA-SHA256, activated `2016-02-24 05:00:00 UTC', expires `2039-01-03 04:59:59 UTC', pin-sha256="oXpPRib46YcSyAAk="
  222. p11: No login requested.
  223. ASSERT: ../../../lib/x509/verify.c[verify_crt]:702
  224. ASSERT: ../../../lib/x509/verify.c[verify_crt]:880
  225. ASSERT: ../../../lib/x509/verify.c[_gnutls_verify_crt_status]:1065
  226. issuer in verification was not found or insecure; trying against trust list
  227. ASSERT: ../../../lib/x509/verify.c[verify_crt]:702
  228. ASSERT: ../../../lib/x509/verify.c[verify_crt]:880
  229. ASSERT: ../../../lib/x509/verify.c[_gnutls_verify_crt_status]:1065
  230. ASSERT: ../../../lib/x509/verify-high.c[gnutls_x509_trust_list_verify_crt2]:1564
  231. p11: No login requested.
  232. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4272
  233. p11: No login requested.
  234. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4272
  235. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4083
  236. crt_is_known: did not find cert, using issuer DN + serial, using DN only
  237. ASSERT: ../../lib/pkcs11.c[_gnutls_pkcs11_crt_is_known]:4627
  238. p11: No login requested.
  239. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4272
  240. p11: No login requested.
  241. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4272
  242. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4083
  243. ASSERT: ../../lib/pkcs11.c[_gnutls_pkcs11_crt_is_known]:4649
  244. crt_is_known: did not find any cert
  245. p11: No login requested.
  246. p11: No login requested.
  247. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4272
  248. p11: No login requested.
  249. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4272
  250. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4083
  251. crt_is_known: did not find cert, using issuer DN + serial, using DN only
  252. ASSERT: ../../lib/pkcs11.c[_gnutls_pkcs11_crt_is_known]:4627
  253. p11: No login requested.
  254. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4272
  255. p11: No login requested.
  256. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4272
  257. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4083
  258. ASSERT: ../../lib/pkcs11.c[_gnutls_pkcs11_crt_is_known]:4649
  259. crt_is_known: did not find any cert
  260. p11: No login requested.
  261. p11: No login requested.
  262. p11: No login requested.
  263. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4272
  264. p11: No login requested.
  265. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4272
  266. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4083
  267. crt_is_known: did not find cert, using issuer DN + serial, using DN only
  268. ASSERT: ../../lib/pkcs11.c[_gnutls_pkcs11_crt_is_known]:4627
  269. p11: No login requested.
  270. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4272
  271. p11: No login requested.
  272. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4272
  273. ASSERT: ../../lib/pkcs11.c[find_cert_cb]:4083
  274. ASSERT: ../../lib/pkcs11.c[_gnutls_pkcs11_crt_is_known]:4649
  275. crt_is_known: did not find any cert
  276. ASSERT: ../../../lib/x509/name_constraints.c[gnutls_x509_crt_get_name_constraints]:508
  277. ASSERT: ../../lib/buffers.c[get_last_packet]:1138
  278. READ: Got 5 bytes from 0x6
  279. READ: read 5 bytes from 0x6
  280. RB: Have 0 bytes into buffer. Adding 5 bytes.
  281. RB: Requested 5 bytes
  282. REC[0x55fceb6c32d0]: SSL 3.3 Handshake packet received. Epoch 0, length: 333
  283. REC[0x55fceb6c32d0]: Expected Packet Handshake(22)
  284. REC[0x55fceb6c32d0]: Received Packet Handshake(22) with length: 333
  285. READ: Got 333 bytes from 0x6
  286. READ: read 333 bytes from 0x6
  287. RB: Have 5 bytes into buffer. Adding 333 bytes.
  288. RB: Requested 338 bytes
  289. REC[0x55fceb6c32d0]: Decrypted Packet[2] Handshake(22) with length: 333
  290. BUF[REC]: Inserted 333 bytes of Data(22)
  291. HSK[0x55fceb6c32d0]: SERVER KEY EXCHANGE (12) was received. Length 329[329], frag offset 0, frag length: 329, sequence: 0
  292. received curve SECP256R1
  293. HSK[0x55fceb6c32d0]: Selected group SECP256R1 (2)
  294. HSK[0x55fceb6c32d0]: verify TLS 1.2 handshake data: using RSA-SHA512
  295. ASSERT: ../../lib/buffers.c[get_last_packet]:1138
  296. READ: Got 5 bytes from 0x6
  297. READ: read 5 bytes from 0x6
  298. RB: Have 0 bytes into buffer. Adding 5 bytes.
  299. RB: Requested 5 bytes
  300. REC[0x55fceb6c32d0]: SSL 3.3 Handshake packet received. Epoch 0, length: 1615
  301. REC[0x55fceb6c32d0]: Expected Packet Handshake(22)
  302. REC[0x55fceb6c32d0]: Received Packet Handshake(22) with length: 1615
  303. READ: Got 1615 bytes from 0x6
  304. READ: read 1615 bytes from 0x6
  305. RB: Have 5 bytes into buffer. Adding 1615 bytes.
  306. RB: Requested 1620 bytes
  307. REC[0x55fceb6c32d0]: Decrypted Packet[3] Handshake(22) with length: 1615
  308. BUF[REC]: Inserted 1615 bytes of Data(22)
  309. HSK[0x55fceb6c32d0]: CERTIFICATE REQUEST (13) was received. Length 1607[1611], frag offset 0, frag length: 1607, sequence: 0
  310. EXT[0x55fceb6c32d0]: rcvd signature algo (6.1) RSA-SHA512
  311. EXT[0x55fceb6c32d0]: rcvd signature algo (6.3) ECDSA-SHA512
  312. EXT[0x55fceb6c32d0]: rcvd signature algo (5.1) RSA-SHA384
  313. EXT[0x55fceb6c32d0]: rcvd signature algo (5.3) ECDSA-SHA384
  314. EXT[0x55fceb6c32d0]: rcvd signature algo (4.1) RSA-SHA256
  315. EXT[0x55fceb6c32d0]: rcvd signature algo (4.3) ECDSA-SHA256
  316. EXT[0x55fceb6c32d0]: rcvd signature algo (2.1) RSA-SHA1
  317. ASSERT: ../../lib/buffers.c[get_last_packet]:1138
  318. HSK[0x55fceb6c32d0]: SERVER HELLO DONE (14) was received. Length 0[0], frag offset 0, frag length: 0, sequence: 0
  319. ASSERT: ../../lib/buffers.c[_gnutls_handshake_io_recv_int]:1392
  320. HSK[0x55fceb6c32d0]: CERTIFICATE was queued [2444 bytes]
  321. HWRITE: enqueued [CERTIFICATE] 2444. Total 2444 bytes.
  322. ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59
  323. ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59
  324. HSK[0x55fceb6c32d0]: CLIENT KEY EXCHANGE was queued [70 bytes]
  325. HWRITE: enqueued [CLIENT KEY EXCHANGE] 70. Total 2514 bytes.
  326. checking cert compat with RSA-SHA512
  327. cannot use privkey of EC/ECDSA with RSA-SHA512
  328. checking cert compat with ECDSA-SHA512
  329. sign handshake cert vrfy: picked ECDSA-SHA512
  330. WARNING:esys:src/tss2-esys/api/Esys_Sign.c:311:Esys_Sign_Finish() Received TPM Error
  331. ERROR:esys:src/tss2-esys/api/Esys_Sign.c:105:Esys_Sign() Esys Finish ErrorCode (0x000001d5)
  332. ERROR: Esys_Sign: tpm:parameter(1):structure is the wrong size
  333. ASSERT: ../../lib/pkcs11_privkey.c[_gnutls_pkcs11_privkey_sign]:409
  334. ASSERT: ../../lib/privkey.c[privkey_sign_and_hash_data]:1343
  335. ASSERT: ../../lib/tls-sig.c[_gnutls_handshake_sign_crt_vrfy12]:647
  336. ASSERT: ../../../lib/auth/cert.c[_gnutls_gen_cert_client_crt_vrfy]:1159
  337. ASSERT: ../../lib/kx.c[_gnutls_send_client_certificate_verify]:428
  338. ASSERT: ../../lib/handshake.c[handshake_client]:3191
  339. BUF[HSK]: Emptied buffer
  340. SSL connection failure: PKCS #11 error.
  341. BUF[HSK]: Emptied buffer
  342. REC[0x55fceb6c32d0]: Start of epoch cleanup
  343. REC[0x55fceb6c32d0]: End of epoch cleanup
  344. REC[0x55fceb6c32d0]: Epoch #0 freed
  345. REC[0x55fceb6c32d0]: Epoch #1 freed
  346. Failed to open HTTPS connection to testvpn.com
  347. Failed to complete authentication
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement