Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 1846633 Details for
Bug 1850512
ca-certificates update causes certificate verification failure
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh90 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
gnutls-cli output
gnutls-cli.out (text/plain), 39.97 KB, created by
Brian J. Murrell
on 2021-12-16 18:39:54 UTC
(
hide
)
Description:
gnutls-cli output
Filename:
MIME Type:
Creator:
Brian J. Murrell
Created:
2021-12-16 18:39:54 UTC
Size:
39.97 KB
patch
obsolete
>|<2>| Initializing needed PKCS #11 modules >|<2>| p11: Initializing module: p11-kit-trust >|<2>| p11: No login requested. >|<3>| p11 attrs: CKA_CLASS (CERT), CKA_CERTIFICATE_TYPE >|<3>| p11 attrs: CKA_TRUSTED >|<3>| p11 attrs: CKA_CERTIFICATE_CATEGORY=CA >|<2>| p11: No login requested. >|<3>| p11 attrs: CKA_CLASS (CERT), CKA_CERTIFICATE_TYPE >|<3>| p11 attrs: CKA_TRUSTED >|<3>| p11 attrs: CKA_CERTIFICATE_CATEGORY=CA >|<3>| ASSERT: pkcs11.c[find_multi_objs_cb]:3138 >|<3>| ASSERT: pkcs11.c[gnutls_pkcs11_obj_list_import_url3]:3467 >|<5>| REC[0x5643c25365d0]: Allocating epoch #0 >|<2>| cfg: system priority /etc/crypto-policies/back-ends/gnutls.config has not changed >|<2>| resolved 'SYSTEM' to 'NORMAL', next '' >|<2>| selected priority string: NORMAL >|<2>| added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list >|<5>| REC[0x5643c25365d0]: Allocating epoch #1 >|<4>| HSK[0x5643c25365d0]: Adv. version: 3.3 >|<2>| Keeping ciphersuite 13.02 (GNUTLS_AES_256_GCM_SHA384) >|<2>| Keeping ciphersuite 13.03 (GNUTLS_CHACHA20_POLY1305_SHA256) >|<2>| Keeping ciphersuite 13.01 (GNUTLS_AES_128_GCM_SHA256) >|<2>| Keeping ciphersuite 13.04 (GNUTLS_AES_128_CCM_SHA256) >|<2>| Keeping ciphersuite c0.2c (GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384) >|<2>| Keeping ciphersuite cc.a9 (GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305) >|<2>| Keeping ciphersuite c0.ad (GNUTLS_ECDHE_ECDSA_AES_256_CCM) >|<2>| Keeping ciphersuite c0.0a (GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1) >|<2>| Keeping ciphersuite c0.2b (GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256) >|<2>| Keeping ciphersuite c0.ac (GNUTLS_ECDHE_ECDSA_AES_128_CCM) >|<2>| Keeping ciphersuite c0.09 (GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1) >|<2>| Keeping ciphersuite c0.30 (GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384) >|<2>| Keeping ciphersuite cc.a8 (GNUTLS_ECDHE_RSA_CHACHA20_POLY1305) >|<2>| Keeping ciphersuite c0.14 (GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1) >|<2>| Keeping ciphersuite c0.2f (GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256) >|<2>| Keeping ciphersuite c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) >|<2>| Keeping ciphersuite 00.9d (GNUTLS_RSA_AES_256_GCM_SHA384) >|<2>| Keeping ciphersuite c0.9d (GNUTLS_RSA_AES_256_CCM) >|<2>| Keeping ciphersuite 00.35 (GNUTLS_RSA_AES_256_CBC_SHA1) >|<2>| Keeping ciphersuite 00.9c (GNUTLS_RSA_AES_128_GCM_SHA256) >|<2>| Keeping ciphersuite c0.9c (GNUTLS_RSA_AES_128_CCM) >|<2>| Keeping ciphersuite 00.2f (GNUTLS_RSA_AES_128_CBC_SHA1) >|<2>| Keeping ciphersuite 00.9f (GNUTLS_DHE_RSA_AES_256_GCM_SHA384) >|<2>| Keeping ciphersuite cc.aa (GNUTLS_DHE_RSA_CHACHA20_POLY1305) >|<2>| Keeping ciphersuite c0.9f (GNUTLS_DHE_RSA_AES_256_CCM) >|<2>| Keeping ciphersuite 00.39 (GNUTLS_DHE_RSA_AES_256_CBC_SHA1) >|<2>| Keeping ciphersuite 00.9e (GNUTLS_DHE_RSA_AES_128_GCM_SHA256) >|<2>| Keeping ciphersuite c0.9e (GNUTLS_DHE_RSA_AES_128_CCM) >|<2>| Keeping ciphersuite 00.33 (GNUTLS_DHE_RSA_AES_128_CBC_SHA1) >|<4>| EXT[0x5643c25365d0]: Preparing extension (OCSP Status Request/5) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Sending extension OCSP Status Request/5 (5 bytes) >|<4>| EXT[0x5643c25365d0]: Preparing extension (Client Certificate Type/19) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Client certificate type was set to default cert type (X.509). We therefore do not send this extension. >|<4>| EXT[0x5643c25365d0]: Preparing extension (Server Certificate Type/20) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Server certificate type was set to default cert type (X.509). We therefore do not send this extension. >|<4>| EXT[0x5643c25365d0]: Preparing extension (Supported Groups/10) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Sent group SECP256R1 (0x17) >|<4>| EXT[0x5643c25365d0]: Sent group SECP384R1 (0x18) >|<4>| EXT[0x5643c25365d0]: Sent group SECP521R1 (0x19) >|<4>| EXT[0x5643c25365d0]: Sent group X25519 (0x1d) >|<4>| EXT[0x5643c25365d0]: Sent group X448 (0x1e) >|<4>| EXT[0x5643c25365d0]: Sent group FFDHE2048 (0x100) >|<4>| EXT[0x5643c25365d0]: Sent group FFDHE3072 (0x101) >|<4>| EXT[0x5643c25365d0]: Sent group FFDHE4096 (0x102) >|<4>| EXT[0x5643c25365d0]: Sent group FFDHE6144 (0x103) >|<4>| EXT[0x5643c25365d0]: Sent group FFDHE8192 (0x104) >|<4>| EXT[0x5643c25365d0]: Sending extension Supported Groups/10 (22 bytes) >|<4>| EXT[0x5643c25365d0]: Preparing extension (Supported EC Point Formats/11) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Sending extension Supported EC Point Formats/11 (2 bytes) >|<4>| EXT[0x5643c25365d0]: Preparing extension (SRP/12) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Preparing extension (Signature Algorithms/13) for 'client hello' >|<4>| EXT[0x5643c25365d0]: sent signature algo (4.1) RSA-SHA256 >|<4>| EXT[0x5643c25365d0]: sent signature algo (8.9) RSA-PSS-SHA256 >|<4>| EXT[0x5643c25365d0]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256 >|<4>| EXT[0x5643c25365d0]: sent signature algo (4.3) ECDSA-SHA256 >|<4>| EXT[0x5643c25365d0]: sent signature algo (8.7) EdDSA-Ed25519 >|<4>| EXT[0x5643c25365d0]: sent signature algo (5.1) RSA-SHA384 >|<4>| EXT[0x5643c25365d0]: sent signature algo (8.10) RSA-PSS-SHA384 >|<4>| EXT[0x5643c25365d0]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384 >|<4>| EXT[0x5643c25365d0]: sent signature algo (5.3) ECDSA-SHA384 >|<4>| EXT[0x5643c25365d0]: sent signature algo (8.8) EdDSA-Ed448 >|<4>| EXT[0x5643c25365d0]: sent signature algo (6.1) RSA-SHA512 >|<4>| EXT[0x5643c25365d0]: sent signature algo (8.11) RSA-PSS-SHA512 >|<4>| EXT[0x5643c25365d0]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512 >|<4>| EXT[0x5643c25365d0]: sent signature algo (6.3) ECDSA-SHA512 >|<4>| EXT[0x5643c25365d0]: sent signature algo (2.1) RSA-SHA1 >|<4>| EXT[0x5643c25365d0]: sent signature algo (2.3) ECDSA-SHA1 >|<4>| EXT[0x5643c25365d0]: Sending extension Signature Algorithms/13 (34 bytes) >|<4>| EXT[0x5643c25365d0]: Preparing extension (SRTP/14) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Preparing extension (Heartbeat/15) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Preparing extension (ALPN/16) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Preparing extension (Encrypt-then-MAC/22) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Sending extension Encrypt-then-MAC/22 (0 bytes) >|<4>| EXT[0x5643c25365d0]: Preparing extension (Extended Master Secret/23) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Sending extension Extended Master Secret/23 (0 bytes) >|<4>| EXT[0x5643c25365d0]: Preparing extension (Session Ticket/35) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Sending extension Session Ticket/35 (0 bytes) >|<4>| EXT[0x5643c25365d0]: Preparing extension (Key Share/51) for 'client hello' >|<4>| EXT[0x5643c25365d0]: sending key share for SECP256R1 >|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60 >|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60 >|<4>| EXT[0x5643c25365d0]: sending key share for X25519 >|<4>| EXT[0x5643c25365d0]: Sending extension Key Share/51 (107 bytes) >|<4>| EXT[0x5643c25365d0]: Preparing extension (Supported Versions/43) for 'client hello' >|<2>| Advertizing version 3.4 >|<2>| Advertizing version 3.3 >|<4>| EXT[0x5643c25365d0]: Sending extension Supported Versions/43 (5 bytes) >|<4>| EXT[0x5643c25365d0]: Preparing extension (Post Handshake Auth/49) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Preparing extension (Safe Renegotiation/65281) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Sending extension Safe Renegotiation/65281 (1 bytes) >|<4>| EXT[0x5643c25365d0]: Preparing extension (Server Name Indication/0) for 'client hello' >|<2>| HSK[0x5643c25365d0]: sent server name: 'imap.mail.yahoo.com' >|<4>| EXT[0x5643c25365d0]: Sending extension Server Name Indication/0 (24 bytes) >|<4>| EXT[0x5643c25365d0]: Preparing extension (Cookie/44) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Preparing extension (Early Data/42) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Preparing extension (PSK Key Exchange Modes/45) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Sending extension PSK Key Exchange Modes/45 (3 bytes) >|<4>| EXT[0x5643c25365d0]: Preparing extension (Record Size Limit/28) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Sending extension Record Size Limit/28 (2 bytes) >|<4>| EXT[0x5643c25365d0]: Preparing extension (Maximum Record Size/1) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Preparing extension (ClientHello Padding/21) for 'client hello' >|<4>| EXT[0x5643c25365d0]: Preparing extension (Pre Shared Key/41) for 'client hello' >|<4>| HSK[0x5643c25365d0]: CLIENT HELLO was queued [392 bytes] >|<5>| REC[0x5643c25365d0]: Preparing Packet Handshake(22) with length: 392 and min pad: 0 >|<9>| ENC[0x5643c25365d0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 >|<5>| REC[0x5643c25365d0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 397 >|<3>| ASSERT: buffers.c[get_last_packet]:1185 >|<10>| READ: Got 5 bytes from 0x7ffdaab00ff0 >|<10>| READ: read 5 bytes from 0x7ffdaab00ff0 >|<10>| RB: Have 0 bytes into buffer. Adding 5 bytes. >|<10>| RB: Requested 5 bytes >|<5>| REC[0x5643c25365d0]: SSL 3.3 Handshake packet received. Epoch 0, length: 155 >|<5>| REC[0x5643c25365d0]: Expected Packet Handshake(22) >|<5>| REC[0x5643c25365d0]: Received Packet Handshake(22) with length: 155 >|<10>| READ: Got 155 bytes from 0x7ffdaab00ff0 >|<10>| READ: read 155 bytes from 0x7ffdaab00ff0 >|<10>| RB: Have 5 bytes into buffer. Adding 155 bytes. >|<10>| RB: Requested 160 bytes >|<5>| REC[0x5643c25365d0]: Decrypted Packet[0] Handshake(22) with length: 155 >|<4>| HSK[0x5643c25365d0]: SERVER HELLO (2) was received. Length 151[151], frag offset 0, frag length: 151, sequence: 0 >|<3>| ASSERT: buffers.c[get_last_packet]:1176 >|<3>| ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1428 >|<4>| HSK[0x5643c25365d0]: Server's version: 3.3 >|<4>| EXT[0x5643c25365d0]: Parsing extension 'Supported Versions/43' (2 bytes) >|<4>| EXT[0x5643c25365d0]: Negotiated version: 3.4 >|<4>| HSK[0x5643c25365d0]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 >|<4>| EXT[0x5643c25365d0]: Parsing extension 'Key Share/51' (69 bytes) >|<4>| HSK[0x5643c25365d0]: Selected group SECP256R1 (2) >|<2>| EXT[0x5643c25365d0]: client generated SECP256R1 shared key >|<5>| REC[0x5643c25365d0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 >|<9>| ENC[0x5643c25365d0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 >|<5>| REC[0x5643c25365d0]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6 >|<4>| REC[0x5643c25365d0]: Sent ChangeCipherSpec >|<5>| REC[0x5643c25365d0]: Initializing epoch #1 >|<9>| INT: CLIENT WRITE KEY [32]: 7874e80574a077866fd90429e34fd30f75df0f27ede7ff156eb2bf59ed2ab553 >|<9>| INT: SERVER WRITE KEY [32]: 3626956da519e1f38dd8eb92676df0592e076c13d6b1c30e7cf6383566556d13 >|<9>| INT: CLIENT WRITE IV [12]: eb26ee2207410d95ca4734f5 >|<9>| INT: SERVER WRITE IV [12]: eace91cff92de6b122dac25e >|<5>| REC[0x5643c25365d0]: Epoch #1 ready >|<4>| HSK[0x5643c25365d0]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 >|<3>| ASSERT: buffers.c[get_last_packet]:1185 >|<10>| READ: Got 5 bytes from 0x7ffdaab00ff0 >|<10>| READ: read 5 bytes from 0x7ffdaab00ff0 >|<10>| RB: Have 0 bytes into buffer. Adding 5 bytes. >|<10>| RB: Requested 5 bytes >|<5>| REC[0x5643c25365d0]: SSL 3.3 ChangeCipherSpec packet received. Epoch 1, length: 1 >|<5>| REC[0x5643c25365d0]: Expected Packet Handshake(22) >|<5>| REC[0x5643c25365d0]: Received Packet ChangeCipherSpec(20) with length: 1 >|<10>| READ: Got 1 bytes from 0x7ffdaab00ff0 >|<10>| READ: read 1 bytes from 0x7ffdaab00ff0 >|<10>| RB: Have 5 bytes into buffer. Adding 1 bytes. >|<10>| RB: Requested 6 bytes >|<10>| discarding change cipher spec in TLS1.3 >|<10>| READ: Got 5 bytes from 0x7ffdaab00ff0 >|<10>| READ: read 5 bytes from 0x7ffdaab00ff0 >|<10>| RB: Have 0 bytes into buffer. Adding 5 bytes. >|<10>| RB: Requested 5 bytes >|<5>| REC[0x5643c25365d0]: SSL 3.3 Application Data packet received. Epoch 1, length: 16400 >|<5>| REC[0x5643c25365d0]: Expected Packet Handshake(22) >|<5>| REC[0x5643c25365d0]: Received Packet Application Data(23) with length: 16400 >|<10>| READ: Got 9965 bytes from 0x7ffdaab00ff0 >|<10>| READ: Got 2896 bytes from 0x7ffdaab00ff0 >|<10>| READ: Got 1448 bytes from 0x7ffdaab00ff0 >|<10>| READ: Got 2091 bytes from 0x7ffdaab00ff0 >|<10>| READ: read 16400 bytes from 0x7ffdaab00ff0 >|<10>| RB: Have 5 bytes into buffer. Adding 16400 bytes. >|<10>| RB: Requested 16405 bytes >|<5>| REC[0x5643c25365d0]: Decrypted Packet[0] Handshake(22) with length: 16367 >|<4>| HSK[0x5643c25365d0]: ENCRYPTED EXTENSIONS (8) was received. Length 28[16363], frag offset 0, frag length: 28, sequence: 0 >|<4>| HSK[0x5643c25365d0]: parsing encrypted extensions >|<4>| EXT[0x5643c25365d0]: Parsing extension 'Supported Groups/10' (22 bytes) >|<3>| ASSERT: buffers.c[get_last_packet]:1185 >|<4>| HSK[0x5643c25365d0]: CERTIFICATE REQUEST (13) was received. Length 15928[16331], frag offset 0, frag length: 15928, sequence: 0 >|<3>| ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1446 >|<4>| HSK[0x5643c25365d0]: parsing certificate request >|<4>| EXT[0x5643c25365d0]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256 >|<4>| EXT[0x5643c25365d0]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384 >|<4>| EXT[0x5643c25365d0]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512 >|<4>| EXT[0x5643c25365d0]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256 >|<4>| EXT[0x5643c25365d0]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384 >|<4>| EXT[0x5643c25365d0]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512 >|<4>| EXT[0x5643c25365d0]: rcvd signature algo (8.9) RSA-PSS-SHA256 >|<4>| EXT[0x5643c25365d0]: rcvd signature algo (8.10) RSA-PSS-SHA384 >|<4>| EXT[0x5643c25365d0]: rcvd signature algo (8.11) RSA-PSS-SHA512 >|<4>| EXT[0x5643c25365d0]: rcvd signature algo (4.1) RSA-SHA256 >|<4>| EXT[0x5643c25365d0]: rcvd signature algo (5.1) RSA-SHA384 >|<4>| EXT[0x5643c25365d0]: rcvd signature algo (6.1) RSA-SHA512 >|<4>| EXT[0x5643c25365d0]: rcvd signature algo (2.3) ECDSA-SHA1 >|<4>| EXT[0x5643c25365d0]: rcvd signature algo (2.1) RSA-SHA1 >|<3>| Peer requested CA: CN=Trustwave Global ECC P256 Certification Authority,O=Trustwave Holdings\, Inc.,L=Chicago,ST=Illinois,C=US >|<3>| Peer requested CA: CN=Hongkong Post Root CA 1,O=Hongkong Post,C=HK >|<3>| Peer requested CA: CN=SecureTrust CA,O=SecureTrust Corporation,C=US >|<3>| Peer requested CA: CN=Entrust Root Certification Authority - EC1,OU=(c) 2012 Entrust\, Inc. - for authorized use only,OU=See www.entrust.net/legal-terms,O=Entrust\, Inc.,C=US >|<3>| Peer requested CA: CN=DigiCert Global Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US >|<3>| Peer requested CA: OU=Security Communication RootCA1,O=SECOM Trust.net,C=JP >|<3>| Peer requested CA: CN=QuoVadis Root CA 2 G3,O=QuoVadis Limited,C=BM >|<3>| Peer requested CA: CN=Hellenic Academic and Research Institutions RootCA 2015,O=Hellenic Academic and Research Institutions Cert. Authority,L=Athens,C=GR >|<3>| Peer requested CA: CN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=US >|<3>| Peer requested CA: CN=Athenz AWS CA,OU=us-west-2,O=Oath Inc.,L=Sunnyvale,ST=CA,C=US >|<3>| Peer requested CA: CN=GeoTrust Primary Certification Authority,O=GeoTrust Inc.,C=US >|<3>| Peer requested CA: CN=Hellenic Academic and Research Institutions ECC RootCA 2015,O=Hellenic Academic and Research Institutions Cert. Authority,L=Athens,C=GR >|<3>| Peer requested CA: CN=emSign ECC Root CA - G3,O=eMudhra Technologies Limited,OU=emSign PKI,C=IN >|<3>| Peer requested CA: OU=Security Communication RootCA2,O=SECOM Trust Systems CO.\,LTD.,C=JP >|<3>| Peer requested CA: CN=Athenz AWS CA,OU=us-east-1,O=Oath Inc.,L=Sunnyvale,ST=CA,C=US >|<3>| Peer requested CA: OU=ePKI Root Certification Authority,O=Chunghwa Telecom Co.\, Ltd.,C=TW >|<3>| Peer requested CA: CN=AffirmTrust Commercial,O=AffirmTrust,C=US >|<3>| Peer requested CA: CN=Certum Trusted Network CA,OU=Certum Certification Authority,O=Unizeto Technologies S.A.,C=PL >|<3>| Peer requested CA: CN=XRamp Global Certification Authority,O=XRamp Security Services Inc,OU=www.xrampsecurity.com,C=US >|<3>| Peer requested CA: CN=EC-ACC,OU=Jerarquia Entitats de Certificacio Catalanes,OU=Vegeu https://www.catcert.net/verarrel (c)03,OU=Serveis Publics de Certificacio,O=Agencia Catalana de Certificacio (NIF Q-0801176-I),C=ES >|<3>| Peer requested CA: CN=emSign Root CA - G1,O=eMudhra Technologies Limited,OU=emSign PKI,C=IN >|<3>| Peer requested CA: CN=Trustwave Global Certification Authority,O=Trustwave Holdings\, Inc.,L=Chicago,ST=Illinois,C=US >|<3>| Peer requested CA: CN=Sonera Class2 CA,O=Sonera,C=FI >|<3>| Peer requested CA: CN=Entrust Root Certification Authority - G4,OU=(c) 2015 Entrust\, Inc. - for authorized use only,OU=See www.entrust.net/legal-terms,O=Entrust\, Inc.,C=US >|<3>| Peer requested CA: CN=GeoTrust Primary Certification Authority - G2,OU=(c) 2007 GeoTrust Inc. - For authorized use only,O=GeoTrust Inc.,C=US >|<3>| Peer requested CA: CN=COMODO ECC Certification Authority,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GB >|<3>| Peer requested CA: CN=ISRG Root X1,O=Internet Security Research Group,C=US >|<3>| Peer requested CA: CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US >|<3>| Peer requested CA: CN=Yahoo Athenz CA,OU=Athenz Tcv,O=Yahoo! Inc.,L=Sunnyvale,ST=CA,C=US >|<3>| Peer requested CA: CN=TrustCor RootCert CA-1,OU=TrustCor Certificate Authority,O=TrustCor Systems S. de R.L.,L=Panama City,ST=Panama,C=PA >|<3>| Peer requested CA: CN=GeoTrust Universal CA,O=GeoTrust Inc.,C=US >|<3>| Peer requested CA: CN=GlobalSign,O=GlobalSign,OU=GlobalSign Root CA - R3 >|<3>| Peer requested CA: CN=Baltimore CyberTrust Root,OU=CyberTrust,O=Baltimore,C=IE >|<3>| Peer requested CA: CN=GeoTrust Universal CA 2,O=GeoTrust Inc.,C=US >|<3>| Peer requested CA: OU=Starfield Class 2 Certification Authority,O=Starfield Technologies\, Inc.,C=US >|<3>| Peer requested CA: CN=AAA Certificate Services,O=Comodo CA Limited,L=Salford,ST=Greater Manchester,C=GB >|<3>| Peer requested CA: CN=Yahoo Athenz CA,OU=Athenz Bfv,O=Yahoo! Inc.,L=Sunnyvale,ST=CA,C=US >|<3>| Peer requested CA: OU=AC RAIZ FNMT-RCM,O=FNMT-RCM,C=ES >|<3>| Peer requested CA: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE >|<3>| Peer requested CA: CN=e-Szigno Root CA 2017,2.5.4.97=#0c0e56415448552d3233353834343937,O=Microsec Ltd.,L=Budapest,C=HU >|<3>| Peer requested CA: CN=AffirmTrust Networking,O=AffirmTrust,C=US >|<3>| Peer requested CA: CN=TWCA Global Root CA,OU=Root CA,O=TAIWAN-CA,C=TW >|<3>| Peer requested CA: CN=AffirmTrust Premium,O=AffirmTrust,C=US >|<3>| Peer requested CA: CN=GeoTrust Primary Certification Authority - G3,OU=(c) 2008 GeoTrust Inc. - For authorized use only,O=GeoTrust Inc.,C=US >|<3>| Peer requested CA: CN=TWCA Root Certification Authority,OU=Root CA,O=TAIWAN-CA,C=TW >|<3>| Peer requested CA: C=DE,O=Atos,CN=Atos TrustedRoot 2011 >|<3>| Peer requested CA: CN=Chambers of Commerce Root - 2008,O=AC Camerfirma S.A.,serialNumber=A82743287,L=Madrid (see current address at www.camerfirma.com/address),C=EU >|<3>| Peer requested CA: CN=SSL.com EV Root Certification Authority RSA R2,O=SSL Corporation,L=Houston,ST=Texas,C=US >|<3>| Peer requested CA: CN=SwissSign Silver CA - G2,O=SwissSign AG,C=CH >|<3>| Peer requested CA: CN=SecureSign RootCA11,O=Japan Certification Services\, Inc.,C=JP >|<3>| Peer requested CA: CN=SSL.com Root Certification Authority ECC,O=SSL Corporation,L=Houston,ST=Texas,C=US >|<3>| Peer requested CA: CN=Entrust Root Certification Authority - G2,OU=(c) 2009 Entrust\, Inc. - for authorized use only,OU=See www.entrust.net/legal-terms,O=Entrust\, Inc.,C=US >|<3>| Peer requested CA: CN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US >|<3>| Peer requested CA: OU=Go Daddy Class 2 Certification Authority,O=The Go Daddy Group\, Inc.,C=US >|<3>| Peer requested CA: CN=TrustCor RootCert CA-2,OU=TrustCor Certificate Authority,O=TrustCor Systems S. de R.L.,L=Panama City,ST=Panama,C=PA >|<3>| Peer requested CA: CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1,OU=Kamu Sertifikasyon Merkezi - Kamu SM,O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK,L=Gebze - Kocaeli,C=TR >|<3>| Peer requested CA: CN=Secure Global CA,O=SecureTrust Corporation,C=US >|<3>| Peer requested CA: CN=T-TeleSec GlobalRoot Class 3,OU=T-Systems Trust Center,O=T-Systems Enterprise Services GmbH,C=DE >|<3>| Peer requested CA: CN=Certigna Root CA,OU=0002 48146308100036,O=Dhimyotis,C=FR >|<3>| Peer requested CA: CN=DigiCert Global Root G3,OU=www.digicert.com,O=DigiCert Inc,C=US >|<3>| Peer requested CA: CN=TrustCor ECA-1,OU=TrustCor Certificate Authority,O=TrustCor Systems S. de R.L.,L=Panama City,ST=Panama,C=PA >|<3>| Peer requested CA: CN=GeoTrust Global CA,O=GeoTrust Inc.,C=US >|<3>| Peer requested CA: CN=Yahoo Athenz CA,OU=Athenz Gqv,O=Yahoo! Inc.,L=Sunnyvale,ST=CA,C=US >|<3>| Peer requested CA: CN=Network Solutions Certificate Authority,O=Network Solutions L.L.C.,C=US >|<3>| Peer requested CA: CN=CFCA EV ROOT,O=China Financial Certification Authority,C=CN >|<3>| Peer requested CA: CN=GlobalSign,O=GlobalSign,OU=GlobalSign ECC Root CA - R5 >|<3>| Peer requested CA: CN=Hellenic Academic and Research Institutions RootCA 2011,O=Hellenic Academic and Research Institutions Cert. Authority,C=GR >|<3>| Peer requested CA: CN=Certum Trusted Network CA 2,OU=Certum Certification Authority,O=Unizeto Technologies S.A.,C=PL >|<3>| Peer requested CA: CN=Starfield Root Certificate Authority - G2,O=Starfield Technologies\, Inc.,L=Scottsdale,ST=Arizona,C=US >|<3>| Peer requested CA: CN=IdenTrust Public Sector Root CA 1,O=IdenTrust,C=US >|<3>| Peer requested CA: CN=Entrust.net Certification Authority (2048),OU=(c) 1999 Entrust.net Limited,OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.),O=Entrust.net >|<3>| Peer requested CA: CN=Staat der Nederlanden Root CA - G3,O=Staat der Nederlanden,C=NL >|<3>| Peer requested CA: CN=TeliaSonera Root CA v1,O=TeliaSonera >|<3>| Peer requested CA: CN=thawte Primary Root CA,OU=(c) 2006 thawte\, Inc. - For authorized use only,OU=Certification Services Division,O=thawte\, Inc.,C=US >|<3>| Peer requested CA: CN=Go Daddy Root Certificate Authority - G2,O=GoDaddy.com\, Inc.,L=Scottsdale,ST=Arizona,C=US >|<3>| Peer requested CA: CN=VeriSign Class 3 Public Primary Certification Authority - G4,OU=(c) 2007 VeriSign\, Inc. - For authorized use only,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US >|<3>| Peer requested CA: CN=Staat der Nederlanden EV Root CA,O=Staat der Nederlanden,C=NL >|<3>| Peer requested CA: CN=Entrust Root Certification Authority,OU=(c) 2006 Entrust\, Inc.,OU=www.entrust.net/CPS is incorporated by reference,O=Entrust\, Inc.,C=US >|<3>| Peer requested CA: OU=certSIGN ROOT CA G2,O=CERTSIGN SA,C=RO >|<3>| Peer requested CA: CN=GTS Root R2,O=Google Trust Services LLC,C=US >|<3>| Peer requested CA: CN=DigiCert Assured ID Root G2,OU=www.digicert.com,O=DigiCert Inc,C=US >|<3>| Peer requested CA: CN=SSL.com Root Certification Authority RSA,O=SSL Corporation,L=Houston,ST=Texas,C=US >|<3>| Peer requested CA: CN=GlobalSign,O=GlobalSign,OU=GlobalSign Root CA - R6 >|<3>| Peer requested CA: CN=Amazon Root CA 4,O=Amazon,C=US >|<3>| Peer requested CA: CN=CA Disig Root R2,O=Disig a.s.,L=Bratislava,C=SK >|<3>| Peer requested CA: CN=OISTE WISeKey Global Root GC CA,OU=OISTE Foundation Endorsed,O=WISeKey,C=CH >|<3>| Peer requested CA: CN=DST Root CA X3,O=Digital Signature Trust Co. >|<3>| Peer requested CA: CN=Buypass Class 2 Root CA,O=Buypass AS-983163327,C=NO >|<3>| Peer requested CA: CN=D-TRUST Root Class 3 CA 2 EV 2009,O=D-Trust GmbH,C=DE >|<3>| Peer requested CA: CN=Hongkong Post Root CA 3,O=Hongkong Post,L=Hong Kong,ST=Hong Kong,C=HK >|<3>| Peer requested CA: CN=DigiCert Assured ID Root G3,OU=www.digicert.com,O=DigiCert Inc,C=US >|<3>| Peer requested CA: CN=SwissSign Gold CA - G2,O=SwissSign AG,C=CH >|<3>| Peer requested CA: CN=USERTrust ECC Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US >|<3>| Peer requested CA: OU=certSIGN ROOT CA,O=certSIGN,C=RO >|<3>| Peer requested CA: CN=IdenTrust Commercial Root CA 1,O=IdenTrust,C=US >|<3>| Peer requested CA: CN=QuoVadis Root CA 2,O=QuoVadis Limited,C=BM >|<3>| Peer requested CA: CN=D-TRUST Root Class 3 CA 2 2009,O=D-Trust GmbH,C=DE >|<3>| Peer requested CA: CN=QuoVadis Root CA 1 G3,O=QuoVadis Limited,C=BM >|<3>| Peer requested CA: CN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US >|<3>| Peer requested CA: CN=GTS Root R3,O=Google Trust Services LLC,C=US >|<3>| Peer requested CA: CN=Izenpe.com,O=IZENPE S.A.,C=ES >|<3>| Peer requested CA: CN=GlobalSign,O=GlobalSign,OU=GlobalSign Root CA - R2 >|<3>| Peer requested CA: CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US >|<3>| Peer requested CA: CN=QuoVadis Root CA 3,O=QuoVadis Limited,C=BM >|<3>| Peer requested CA: CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\, Inc.,L=Scottsdale,ST=Arizona,C=US >|<3>| Peer requested CA: CN=emSign ECC Root CA - C3,O=eMudhra Inc,OU=emSign PKI,C=US >|<3>| Peer requested CA: CN=OISTE WISeKey Global Root GB CA,OU=OISTE Foundation Endorsed,O=WISeKey,C=CH >|<3>| Peer requested CA: CN=Amazon Root CA 3,O=Amazon,C=US >|<3>| Peer requested CA: CN=Microsoft RSA Root Certificate Authority 2017,O=Microsoft Corporation,C=US >|<3>| Peer requested CA: CN=QuoVadis Root CA 3 G3,O=QuoVadis Limited,C=BM >|<3>| Peer requested CA: EMAIL=info@e-szigno.hu,CN=Microsec e-Szigno Root CA 2009,O=Microsec Ltd.,L=Budapest,C=HU >|<3>| Peer requested CA: CN=NetLock Arany (Class Gold) FÅtanúsÃtvány,OU=TanúsÃtványkiadók (Certification Services),O=NetLock Kft.,L=Budapest,C=HU >|<3>| Peer requested CA: CN=Actalis Authentication Root CA,O=Actalis S.p.A./03358520967,L=Milan,C=IT >|<3>| Peer requested CA: CN=Autoridad de Certificacion Firmaprofesional CIF A62634068,C=ES >|<3>| Peer requested CA: CN=Certigna,O=Dhimyotis,C=FR >|<3>| Peer requested CA: CN=GTS Root R1,O=Google Trust Services LLC,C=US >|<3>| Peer requested CA: CN=E-Tugra Certification Authority,OU=E-Tugra Sertifikasyon Merkezi,O=E-TuÄra EBG BiliÅim Teknolojileri ve Hizmetleri A.Å.,L=Ankara,C=TR >|<3>| Peer requested CA: C=ES,O=ACCV,OU=PKIACCV,CN=ACCVRAIZ1 >|<3>| Peer requested CA: CN=QuoVadis Root Certification Authority,OU=Root Certification Authority,O=QuoVadis Limited,C=BM >|<3>| Peer requested CA: CN=SSL.com EV Root Certification Authority ECC,O=SSL Corporation,L=Houston,ST=Texas,C=US >|<3>| Peer requested CA: CN=Buypass Class 3 Root CA,O=Buypass AS-983163327,C=NO >|<3>| Peer requested CA: CN=thawte Primary Root CA - G2,OU=(c) 2007 thawte\, Inc. - For authorized use only,O=thawte\, Inc.,C=US >|<3>| Peer requested CA: CN=emSign Root CA - C1,O=eMudhra Inc,OU=emSign PKI,C=US >|<3>| Peer requested CA: CN=VeriSign Universal Root Certification Authority,OU=(c) 2008 VeriSign\, Inc. - For authorized use only,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US >|<3>| Peer requested CA: CN=Cybertrust Global Root,O=Cybertrust\, Inc >|<3>| Peer requested CA: CN=GTS Root R4,O=Google Trust Services LLC,C=US >|<3>| Peer requested CA: CN=Trustwave Global ECC P384 Certification Authority,O=Trustwave Holdings\, Inc.,L=Chicago,ST=Illinois,C=US >|<3>| Peer requested CA: OU=Trustis FPS Root CA,O=Trustis Limited,C=GB >|<3>| Peer requested CA: CN=Amazon Root CA 1,O=Amazon,C=US >|<3>| Peer requested CA: CN=GDCA TrustAUTH R5 ROOT,O=GUANG DONG CERTIFICATE AUTHORITY CO.\,LTD.,C=CN >|<3>| Peer requested CA: CN=Amazon Root CA 2,O=Amazon,C=US >|<3>| Peer requested CA: CN=UCA Extended Validation Root,O=UniTrust,C=CN >|<3>| Peer requested CA: CN=GlobalSign,O=GlobalSign,OU=GlobalSign ECC Root CA - R4 >|<3>| Peer requested CA: CN=COMODO Certification Authority,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GB >|<3>| Peer requested CA: CN=Global Chambersign Root - 2008,O=AC Camerfirma S.A.,serialNumber=A82743287,L=Madrid (see current address at www.camerfirma.com/address),C=EU >|<3>| Peer requested CA: CN=thawte Primary Root CA - G3,OU=(c) 2008 thawte\, Inc. - For authorized use only,OU=Certification Services Division,O=thawte\, Inc.,C=US >|<3>| Peer requested CA: CN=COMODO RSA Certification Authority,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GB >|<3>| Peer requested CA: CN=UCA Global G2 Root,O=UniTrust,C=CN >|<3>| Peer requested CA: CN=Microsoft ECC Root Certificate Authority 2017,O=Microsoft Corporation,C=US >|<3>| Peer requested CA: CN=AffirmTrust Premium ECC,O=AffirmTrust,C=US >|<3>| Peer requested CA: CN=T-TeleSec GlobalRoot Class 2,OU=T-Systems Trust Center,O=T-Systems Enterprise Services GmbH,C=DE >|<3>| Peer requested CA: CN=DigiCert Global Root G2,OU=www.digicert.com,O=DigiCert Inc,C=US >|<3>| Peer requested CA: CN=SZAFIR ROOT CA2,O=Krajowa Izba Rozliczeniowa S.A.,C=PL >|<3>| ASSERT: buffers.c[get_last_packet]:1185 >|<4>| HSK[0x5643c25365d0]: CERTIFICATE (11) was received. Length 2979[399], frag offset 0, frag length: 399, sequence: 0 >|<3>| ASSERT: buffers.c[_gnutls_parse_record_buffered_msgs]:1317 >|<3>| ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1446 >|<3>| ASSERT: tls13/certificate.c[_gnutls13_recv_certificate]:59 >|<3>| ASSERT: buffers.c[get_last_packet]:1185 >|<10>| READ: Got 5 bytes from 0x7ffdaab00ff0 >|<10>| READ: read 5 bytes from 0x7ffdaab00ff0 >|<10>| RB: Have 0 bytes into buffer. Adding 5 bytes. >|<10>| RB: Requested 5 bytes >|<5>| REC[0x5643c25365d0]: SSL 3.3 Application Data packet received. Epoch 1, length: 2929 >|<5>| REC[0x5643c25365d0]: Expected Packet Handshake(22) >|<5>| REC[0x5643c25365d0]: Received Packet Application Data(23) with length: 2929 >|<10>| READ: Got 2929 bytes from 0x7ffdaab00ff0 >|<10>| READ: read 2929 bytes from 0x7ffdaab00ff0 >|<10>| RB: Have 5 bytes into buffer. Adding 2929 bytes. >|<10>| RB: Requested 2934 bytes >|<5>| REC[0x5643c25365d0]: Decrypted Packet[1] Handshake(22) with length: 2896 >|<4>| HSK[0x5643c25365d0]: parsing certificate message >|<3>| ASSERT: buffers.c[get_last_packet]:1185 >|<4>| HSK[0x5643c25365d0]: CERTIFICATE VERIFY (15) was received. Length 260[312], frag offset 0, frag length: 260, sequence: 0 >|<3>| ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1446 >|<4>| HSK[0x5643c25365d0]: Parsing certificate verify >|<4>| HSK[0x5643c25365d0]: verifying TLS 1.3 handshake data using RSA-PSS-RSAE-SHA256 >|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60 >|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60 >|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60 >|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60 >|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60 >|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60 >|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60 >|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60 >|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60 >|<3>| ASSERT: mpi.c[wrap_nettle_mpi_print]:60 >|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_get2]:98 >|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_get2]:98 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<2>| p11: No login requested. >|<3>| ASSERT: verify.c[verify_crt]:688 >|<3>| ASSERT: verify.c[verify_crt]:840 >|<3>| ASSERT: verify.c[_gnutls_verify_crt_status]:1034 >|<2>| issuer in verification was not found or insecure; trying against trust list >|<3>| ASSERT: verify.c[verify_crt]:688 >|<3>| ASSERT: verify.c[verify_crt]:840 >|<3>| ASSERT: verify.c[_gnutls_verify_crt_status]:1034 >|<3>| ASSERT: verify-high.c[gnutls_x509_trust_list_verify_crt2]:1613 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4089 >|<2>| crt_is_known: did not find cert, using issuer DN + serial, using DN only >|<3>| ASSERT: pkcs11.c[_gnutls_pkcs11_crt_is_known]:4629 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4089 >|<3>| ASSERT: pkcs11.c[_gnutls_pkcs11_crt_is_known]:4652 >|<2>| crt_is_known: did not find any cert >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4089 >|<2>| crt_is_known: did not find cert, using issuer DN + serial, using DN only >|<3>| ASSERT: pkcs11.c[_gnutls_pkcs11_crt_is_known]:4629 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4089 >|<3>| ASSERT: pkcs11.c[_gnutls_pkcs11_crt_is_known]:4652 >|<2>| crt_is_known: did not find any cert >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4089 >|<2>| crt_is_known: did not find cert, using issuer DN + serial, using DN only >|<3>| ASSERT: pkcs11.c[_gnutls_pkcs11_crt_is_known]:4629 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4089 >|<3>| ASSERT: pkcs11.c[_gnutls_pkcs11_crt_is_known]:4652 >|<2>| crt_is_known: did not find any cert >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4089 >|<2>| crt_is_known: did not find cert, using issuer DN + serial, using DN only >|<3>| ASSERT: pkcs11.c[_gnutls_pkcs11_crt_is_known]:4629 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4089 >|<3>| ASSERT: pkcs11.c[_gnutls_pkcs11_crt_is_known]:4652 >|<2>| crt_is_known: did not find any cert >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<2>| p11: No login requested. >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4089 >|<2>| crt_is_known: did not find cert, using issuer DN + serial, using DN only >|<3>| ASSERT: pkcs11.c[_gnutls_pkcs11_crt_is_known]:4629 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<2>| p11: No login requested. >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4267 >|<3>| ASSERT: pkcs11.c[find_cert_cb]:4089 >|<3>| ASSERT: pkcs11.c[_gnutls_pkcs11_crt_is_known]:4652 >|<2>| crt_is_known: did not find any cert >|<2>| looking for key purpose '1.3.6.1.5.5.7.3.1', but have '1.3.6.1.5.5.7.3.4' >|<3>| ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:469 >|<3>| ASSERT: name_constraints.c[gnutls_x509_crt_get_name_constraints]:469 >|<3>| ASSERT: buffers.c[get_last_packet]:1185 >|<4>| HSK[0x5643c25365d0]: FINISHED (20) was received. Length 48[48], frag offset 0, frag length: 48, sequence: 0 >|<3>| ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1446 >|<4>| HSK[0x5643c25365d0]: parsing finished >|<4>| HSK[0x5643c25365d0]: CERTIFICATE was queued [8 bytes] >|<4>| HSK[0x5643c25365d0]: sending finished >|<4>| HSK[0x5643c25365d0]: FINISHED was queued [52 bytes] >|<5>| REC[0x5643c25365d0]: Preparing Packet Handshake(22) with length: 8 and min pad: 0 >|<9>| ENC[0x5643c25365d0]: cipher: AES-256-GCM, MAC: AEAD, Epoch: 1 >|<5>| REC[0x5643c25365d0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 30 >|<5>| REC[0x5643c25365d0]: Preparing Packet Handshake(22) with length: 52 and min pad: 0 >|<9>| ENC[0x5643c25365d0]: cipher: AES-256-GCM, MAC: AEAD, Epoch: 1 >|<5>| REC[0x5643c25365d0]: Sent Packet[2] Handshake(22) in epoch 1 and length: 74 >|<3>| ASSERT: constate.c[_gnutls_epoch_get]:955 >|<5>| REC[0x5643c25365d0]: Allocating epoch #2 >|<5>| REC[0x5643c25365d0]: Initializing epoch #2 >|<9>| INT: CLIENT WRITE KEY [32]: 29238a32f7bbe38b97db13536445432a6f1cfbdfb1350a07b72863020f3d98c4 >|<9>| INT: SERVER WRITE KEY [32]: 0b6b1f74db93b0674efb050e32cee60d5ec87b08d187f04ba26fb0e1d76374cb >|<9>| INT: CLIENT WRITE IV [12]: ee92265760894a7d158c563c >|<9>| INT: SERVER WRITE IV [12]: 1a964d62527ed96b9095e760 >|<5>| REC[0x5643c25365d0]: Epoch #2 ready >|<4>| HSK[0x5643c25365d0]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 >|<5>| REC[0x5643c25365d0]: Start of epoch cleanup >|<5>| REC[0x5643c25365d0]: Epoch #0 freed >|<5>| REC[0x5643c25365d0]: Epoch #1 freed >|<5>| REC[0x5643c25365d0]: End of epoch cleanup >|<3>| ASSERT: server_name.c[gnutls_server_name_get]:229 >|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_get2]:98 >|<3>| ASSERT: ocsp-api.c[gnutls_ocsp_status_request_is_checked]:631 >|<3>| ASSERT: srtp.c[gnutls_srtp_get_selected_profile]:320 >|<3>| ASSERT: alpn.c[gnutls_alpn_get_selected_protocol]:246 >Processed 151 CA certificate(s). >Resolving 'imap.mail.yahoo.com:imaps'... >Connecting to '67.195.205.49:993'... >- Successfully sent 0 certificate(s) to server. >- Server has requested a certificate. >- Certificate type: X.509 >- Got a certificate list of 2 certificates. >- Certificate[0] info: > - subject `CN=*.imap.mail.yahoo.com,O=Oath Inc,L=Sunnyvale,ST=California,C=US', issuer `CN=DigiCert SHA2 High Assurance Server CA,OU=www.digicert.com,O=DigiCert Inc,C=US', serial 0x07e7b4cb914ffc7fb3e03105c9da0be1, RSA key 2048 bits, signed using RSA-SHA256, activated `2021-09-21 00:00:00 UTC', expires `2022-03-16 23:59:59 UTC', pin-sha256="PfbNZ6sP09mi+ZsKYmACJJcn207YEPBr9VC0ZeUjoA0=" > Public Key ID: > sha1:09014a456c06b24705a90f07f62abedddf08ea52 > sha256:3df6cd67ab0fd3d9a2f99b0a626002249727db4ed810f06bf550b465e523a00d > Public Key PIN: > pin-sha256:PfbNZ6sP09mi+ZsKYmACJJcn207YEPBr9VC0ZeUjoA0= > >- Certificate[1] info: > - subject `CN=DigiCert SHA2 High Assurance Server CA,OU=www.digicert.com,O=DigiCert Inc,C=US', issuer `CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US', serial 0x04e1e7a4dc5cf2f36dc02b42b85d159f, RSA key 2048 bits, signed using RSA-SHA256, activated `2013-10-22 12:00:00 UTC', expires `2028-10-22 12:00:00 UTC', pin-sha256="k2v657xBsOVe1PQRwOsHsw3bsGT2VzIqz5K+59sNQws=" >- Status: The certificate is trusted. >- Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) >- Session ID: CE:1A:D4:41:10:42:13:E0:D1:19:BC:2D:51:7C:F5:56:0E:EC:AB:31:D8:DB:65:02:74:2E:E8:B4:EE:10:4B:4E >- Options: >- Handshake was completed > >- Simple Client Mode: > >|<10>| READ: Got 5 bytes from 0x7ffdaab00ff0 >|<10>| READ: read 5 bytes from 0x7ffdaab00ff0 >|<10>| RB: Have 0 bytes into buffer. Adding 5 bytes. >|<10>| RB: Requested 5 bytes >|<5>| REC[0x5643c25365d0]: SSL 3.3 Application Data packet received. Epoch 2, length: 83 >|<5>| REC[0x5643c25365d0]: Expected Packet Application Data(23) >|<5>| REC[0x5643c25365d0]: Received Packet Application Data(23) with length: 83 >|<10>| READ: Got 83 bytes from 0x7ffdaab00ff0 >|<10>| READ: read 83 bytes from 0x7ffdaab00ff0 >|<10>| RB: Have 5 bytes into buffer. Adding 83 bytes. >|<10>| RB: Requested 88 bytes >|<5>| REC[0x5643c25365d0]: Decrypted Packet[0] Handshake(22) with length: 50 >|<3>| ASSERT: buffers.c[get_last_packet]:1185 >|<4>| HSK[0x5643c25365d0]: NEW SESSION TICKET (4) was received. Length 46[46], frag offset 0, frag length: 46, sequence: 0 >|<3>| ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1446 >|<4>| HSK[0x5643c25365d0]: parsing session ticket message >|<3>| ASSERT: record.c[_gnutls_recv_in_buffers]:1578 >|<3>| ASSERT: record.c[_gnutls_recv_int]:1776 >|<10>| READ: Got 5 bytes from 0x7ffdaab00ff0 >|<10>| READ: read 5 bytes from 0x7ffdaab00ff0 >|<10>| RB: Have 0 bytes into buffer. Adding 5 bytes. >|<10>| RB: Requested 5 bytes >|<5>| REC[0x5643c25365d0]: SSL 3.3 Application Data packet received. Epoch 2, length: 83 >|<5>| REC[0x5643c25365d0]: Expected Packet Application Data(23) >|<5>| REC[0x5643c25365d0]: Received Packet Application Data(23) with length: 83 >|<10>| READ: Got 83 bytes from 0x7ffdaab00ff0 >|<10>| READ: read 83 bytes from 0x7ffdaab00ff0 >|<10>| RB: Have 5 bytes into buffer. Adding 83 bytes. >|<10>| RB: Requested 88 bytes >|<5>| REC[0x5643c25365d0]: Decrypted Packet[1] Handshake(22) with length: 50 >|<3>| ASSERT: buffers.c[get_last_packet]:1185 >|<4>| HSK[0x5643c25365d0]: NEW SESSION TICKET (4) was received. Length 46[46], frag offset 0, frag length: 46, sequence: 0 >|<3>| ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1446 >|<4>| HSK[0x5643c25365d0]: parsing session ticket message >|<3>| ASSERT: record.c[_gnutls_recv_in_buffers]:1578 >|<3>| ASSERT: record.c[_gnutls_recv_int]:1776 >|<10>| READ: Got 5 bytes from 0x7ffdaab00ff0 >|<10>| READ: read 5 bytes from 0x7ffdaab00ff0 >|<10>| RB: Have 0 bytes into buffer. Adding 5 bytes. >|<10>| RB: Requested 5 bytes >|<5>| REC[0x5643c25365d0]: SSL 3.3 Application Data packet received. Epoch 2, length: 207 >|<5>| REC[0x5643c25365d0]: Expected Packet Application Data(23) >|<5>| REC[0x5643c25365d0]: Received Packet Application Data(23) with length: 207 >|<10>| READ: Got 207 bytes from 0x7ffdaab00ff0 >|<10>| READ: read 207 bytes from 0x7ffdaab00ff0 >|<10>| RB: Have 5 bytes into buffer. Adding 207 bytes. >|<10>| RB: Requested 212 bytes >|<5>| REC[0x5643c25365d0]: Decrypted Packet[2] Application Data(23) with length: 174 >* OK [CAPABILITY IMAP4rev1 SASL-IR AUTH=PLAIN AUTH=XOAUTH2 AUTH=OAUTHBEARER ID MOVE NAMESPACE XYMHIGHESTMODSEQ UIDPLUS LITERAL+ CHILDREN X-MSG-EXT OBJECTID] IMAP4rev1 Hello
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1850512
:
1846624
| 1846633 |
1940418