Mbed TLS is now part of TrustedFirmware.org.

Recent Chrome incompatibility


Sep 21, 2013 19:36
ioio

Hi Paul,

until a few days ago i was able to access my polarssl based https server using either Chrome or IE. i recently tried to use that server from a another computer but i had an ERR_SSL_PROTOCOL_ERROR with Chrome. IE was working nice.

yesterday, i restarted my dev computer and since then i have the same issue: i can't connect anymore with Chrome to the server, but IE his working nice. It may come from a Chrome update issue, but any other HTTPS server i tried online is working nice, so PolarSSL may have an issue too ...

i seen that someone had a problem with TLS_DHE_RSA_WITH_AES_256_CBC_SHA_256, it may be the same issue.

i'm still using 1.2.8, here is a debug log :

DEBUG : => handshake
DEBUG : => handshake
DEBUG : server state: 0
DEBUG : => flush output
DEBUG : <= flush output
DEBUG : server state: 1
DEBUG : => flush output
DEBUG : <= flush output
DEBUG : server state: 0
DEBUG : => parse client hello
DEBUG : => flush output
DEBUG : => fetch input
DEBUG : in_left: 0, nb_want: 5
DEBUG : ssl->f_recv() returned 5 (0x5)
DEBUG : <= flush output
DEBUG : <= fetch input
DEBUG : server state: 1
  ALL : dumping 'record header' (5 bytes)
DEBUG : => flush output
  ALL : 0000:  16 03 01 00 93
DEBUG : <= flush output
TRACE : client hello v3, message type: 22
DEBUG : => parse client hello
TRACE : client hello v3, message len.: 147
DEBUG : => fetch input
TRACE : client hello v3, protocol ver: [3:1]
DEBUG : in_left: 0, nb_want: 5
DEBUG : => fetch input
DEBUG : ssl->f_recv() returned 5 (0x5)
DEBUG : in_left: 5, nb_want: 152
DEBUG : in_left: 5, nb_want: 152
  ALL : dumping 'record header' (5 bytes)
DEBUG : ssl->f_recv() returned 147 (0x93)
  ALL : 0000:  16 03 01 00 93
DEBUG : <= fetch input
TRACE : client hello v3, message type: 22
  ALL : dumping 'record contents' (147 bytes)
TRACE : client hello v3, message len.: 147
  ALL : 0000:  01 00 00 8f 03 02 52 3d f3 a2 51 76 13 d6 8c 7d
TRACE : client hello v3, protocol ver: [3:1]
  ALL : 0010:  04 40 a3 cb d4 5d 18 8b 35 12 6a fa ba b3 d3 a0
DEBUG : => fetch input
  ALL : 0020:  95 a2 be 5d be 06 00 00 28 c0 0a c0 14 00 39 00
DEBUG : in_left: 5, nb_want: 152
  ALL : 0030:  6b 00 35 00 3d c0 07 c0 09 c0 23 c0 11 c0 13 c0
DEBUG : ssl->f_recv() returned 147 (0x93)
  ALL : 0040:  27 00 33 00 67 00 32 00 05 00 04 00 2f 00 3c 00
  ALL : 0050:  0a 01 00 00 3e 00 00 00 0e 00 0c 00 00 09 6c 6f
DEBUG : <= fetch input
  ALL : 0060:  63 61 6c 68 6f 73 74 ff 01 00 01 00 00 0a 00 08
  ALL : dumping 'record contents' (147 bytes)
  ALL : 0070:  00 06 00 17 00 18 00 19 00 0b 00 02 01 00 00 23
  ALL : 0000:  01 00 00 8f 03 02 52 3d f3 a2 6c 61 40 10 b6 0d
  ALL : 0080:  00 00 33 74 00 00 75 4f 00 00 00 05 00 05 01 00
  ALL : 0010:  44 b4 56 8d 70 a7 9f 4b 54 a6 b3 f8 bc 7e 68 b2
  ALL : 0090:  00 00 00
  ALL : 0020:  3e 4a a9 1f 90 13 00 00 28 c0 0a c0 14 00 39 00
TRACE : client hello v3, handshake type: 1
  ALL : 0030:  6b 00 35 00 3d c0 07 c0 09 c0 23 c0 11 c0 13 c0
TRACE : client hello v3, handshake len.: 143
  ALL : 0040:  27 00 33 00 67 00 32 00 05 00 04 00 2f 00 3c 00
TRACE : client hello v3, max. version: [3:2]
TRACE : dumping 'client hello, random bytes' (32 bytes)
TRACE : 0000:  52 3d f3 a2 51 76 13 d6 8c 7d 04 40 a3 cb d4 5d
  ALL : 0050:  0a 01 00 00 3e 00 00 00 0e 00 0c 00 00 09 6c 6f
TRACE : 0010:  18 8b 35 12 6a fa ba b3 d3 a0 95 a2 be 5d be 06
TRACE : dumping 'client hello, session id' (0 bytes)
TRACE : dumping 'client hello, ciphersuitelist' (40 bytes)
  ALL : 0060:  63 61 6c 68 6f 73 74 ff 01 00 01 00 00 0a 00 08
TRACE : 0000:  c0 0a c0 14 00 39 00 6b 00 35 00 3d c0 07 c0 09
  ALL : 0070:  00 06 00 17 00 18 00 19 00 0b 00 02 01 00 00 23
TRACE : 0010:  c0 23 c0 11 c0 13 c0 27 00 33 00 67 00 32 00 05
  ALL : 0080:  00 00 33 74 00 00 75 4f 00 00 00 05 00 05 01 00
TRACE : 0020:  00 04 00 2f 00 3c 00 0a
  ALL : 0090:  00 00 00
TRACE : dumping 'client hello, compression' (1 bytes)
TRACE : client hello v3, handshake type: 1
TRACE : client hello v3, handshake len.: 143
TRACE : client hello v3, max. version: [3:2]
TRACE : 0000:  00
TRACE : dumping 'client hello, random bytes' (32 bytes)
TRACE : found ServerName extension
TRACE : 0000:  52 3d f3 a2 6c 61 40 10 b6 0d 44 b4 56 8d 70 a7
TRACE : found renegotiation extension
TRACE : 0010:  9f 4b 54 a6 b3 f8 bc 7e 68 b2 3e 4a a9 1f 90 13
TRACE : unknown extension found: 10 (ignoring)
TRACE : dumping 'client hello, session id' (0 bytes)
TRACE : unknown extension found: 11 (ignoring)
TRACE : dumping 'client hello, ciphersuitelist' (40 bytes)
TRACE : unknown extension found: 35 (ignoring)
TRACE : 0000:  c0 0a c0 14 00 39 00 6b 00 35 00 3d c0 07 c0 09
TRACE : unknown extension found: 13172 (ignoring)
TRACE : 0010:  c0 23 c0 11 c0 13 c0 27 00 33 00 67 00 32 00 05
TRACE : unknown extension found: 30031 (ignoring)
TRACE : 0020:  00 04 00 2f 00 3c 00 0a
TRACE : unknown extension found: 5 (ignoring)
TRACE : dumping 'client hello, compression' (1 bytes)
DEBUG : <= parse client hello
TRACE : 0000:  00
DEBUG : server state: 2
TRACE : found ServerName extension
DEBUG : => flush output
TRACE : found renegotiation extension
DEBUG : <= flush output
TRACE : unknown extension found: 10 (ignoring)
DEBUG : => write server hello
TRACE : unknown extension found: 11 (ignoring)
TRACE : server hello, chosen version: [3:2]
TRACE : unknown extension found: 35 (ignoring)
TRACE : server hello, current time: 1379791778
TRACE : unknown extension found: 13172 (ignoring)
TRACE : dumping 'server hello, random bytes' (32 bytes)
TRACE : unknown extension found: 30031 (ignoring)
TRACE : 0000:  52 3d f3 a2 9d 8c 1f d8 ab 9b 6c ce 92 82 ca 17
TRACE : unknown extension found: 5 (ignoring)
TRACE : 0010:  32 d6 13 5c 4d a4 e9 ac 16 5b bf c2 d7 a7 17 16
DEBUG : <= parse client hello
TRACE : server hello, session id len.: 32
DEBUG : server state: 2
TRACE : dumping 'server hello, session id' (32 bytes)
DEBUG : => flush output
TRACE : 0000:  fd 78 e1 63 d6 8c 59 5c 29 11 20 7f e4 46 7d 7d
DEBUG : <= flush output
TRACE : 0010:  08 69 71 7e 2d 64 c9 97 d2 46 83 f3 c5 45 42 08
DEBUG : => write server hello
TRACE : no session has been resumed
TRACE : server hello, chosen version: [3:2]
TRACE : server hello, chosen ciphersuite: 107
TRACE : server hello, current time: 1379791778
TRACE : server hello, compress alg.: 0
TRACE : dumping 'server hello, random bytes' (32 bytes)
TRACE : server hello, prepping for secure renegotiation extension
TRACE : 0000:  52 3d f3 a2 45 b4 8b 46 8d 67 eb ef a0 35 bf 11
TRACE : server hello, total extension length: 5
TRACE : 0010:  a0 df bc 54 ae 00 37 75 9e 72 7c 84 2c 8c ad d0
TRACE : client hello, secure renegotiation extension
TRACE : server hello, session id len.: 32
DEBUG : => write record
TRACE : dumping 'server hello, session id' (32 bytes)
TRACE : output record: msgtype = 22, version = [3:2], msglen = 81
TRACE : 0000:  df 7f a5 48 32 70 93 2e 2b 96 c4 5a 09 27 91 f5
  ALL : dumping 'output record header sent to network' (5 bytes)
TRACE : 0010:  e6 7f c1 58 23 bc f9 87 5e 5c af 14 f3 ca 8c 3d
  ALL : 0000:  16 03 02 00 51
TRACE : no session has been resumed
  ALL : dumping 'output record sent to network' (81 bytes)
TRACE : server hello, chosen ciphersuite: 107
  ALL : 0000:  02 00 00 4d 03 02 52 3d f3 a2 9d 8c 1f d8 ab 9b
TRACE : server hello, compress alg.: 0
  ALL : 0010:  6c ce 92 82 ca 17 32 d6 13 5c 4d a4 e9 ac 16 5b
TRACE : server hello, prepping for secure renegotiation extension
  ALL : 0020:  bf c2 d7 a7 17 16 20 fd 78 e1 63 d6 8c 59 5c 29
TRACE : server hello, total extension length: 5
  ALL : 0030:  11 20 7f e4 46 7d 7d 08 69 71 7e 2d 64 c9 97 d2
TRACE : client hello, secure renegotiation extension
  ALL : 0040:  46 83 f3 c5 45 42 08 00 6b 00 00 05 ff 01 00 01
DEBUG : => write record
  ALL : 0050:  00
TRACE : output record: msgtype = 22, version = [3:2], msglen = 81
DEBUG : => flush output
  ALL : dumping 'output record header sent to network' (5 bytes)
DEBUG : message length: 86, out_left: 86
  ALL : 0000:  16 03 02 00 51
DEBUG : ssl->f_send (header)() returned 5 (0x5)
  ALL : dumping 'output record sent to network' (81 bytes)
DEBUG : ssl->f_send() returned 81 (0x51)
DEBUG : <= flush output
DEBUG : <= write record
  ALL : 0000:  02 00 00 4d 03 02 52 3d f3 a2 45 b4 8b 46 8d 67
DEBUG : => handshake
DEBUG : <= write server hello
  ALL : 0010:  eb ef a0 35 bf 11 a0 df bc 54 ae 00 37 75 9e 72
DEBUG : server state: 0
DEBUG : server state: 3
  ALL : 0020:  7c 84 2c 8c ad d0 20 df 7f a5 48 32 70 93 2e 2b
DEBUG : => flush output
DEBUG : => flush output
  ALL : 0030:  96 c4 5a 09 27 91 f5 e6 7f c1 58 23 bc f9 87 5e
DEBUG : <= flush output
DEBUG : <= flush output
  ALL : 0040:  5c af 14 f3 ca 8c 3d 00 6b 00 00 05 ff 01 00 01
DEBUG : server state: 1
DEBUG : => write certificate
DEBUG : => flush output
TRACE : own certificate #1:
..\..\library\ssl_tls.c(2207): cert. version : 3
..\..\library\ssl_tls.c(2207): serial number : 04
..\..\library\ssl_tls.c(2207): issuer name   : C=UK, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=root CA
..\..\library\ssl_tls.c(2207): subject name  : C=US, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=SERVER
..\..\library\ssl_tls.c(2207): issued  on    : 2013-09-21 18:10:00
..\..\library\ssl_tls.c(2207): expires on    : 2014-09-21 18:10:00
..\..\library\ssl_tls.c(2207): signed using  : RSA+SHA1
..\..\library\ssl_tls.c(2207): RSA key size  : 1024 bits
DEBUG : <= flush output
TRACE : value of 'crt->rsa.N' (1024 bits) is:
DEBUG : => parse client hello
TRACE :  ba c9 d1 d6 a1 58 5c d7 46 c1 bf 16 67 f4 04 58
DEBUG : => fetch input
TRACE :  a1 1a 0a 7b eb 24 b4 07 b6 9e 93 c3 7c fe e6 cb
DEBUG : in_left: 0, nb_want: 5
TRACE :  21 94 61 ba 57 b0 bf f6 31 33 5b b1 d0 e1 08 c5
DEBUG : ssl->f_recv() returned 5 (0x5)
TRACE :  26 a9 64 d7 76 0f 6c f3 3c 28 69 5a bd 4a ac a3
DEBUG : <= fetch input
TRACE :  56 f1 c5 08 4f 61 c2 0e d9 d5 27 54 83 a0 e4 55
  ALL : dumping 'record header' (5 bytes)
TRACE :  8b ff 59 d7 f6 eb 5d f6 b9 d3 e7 f5 2f 92 56 43
TRACE :  ca 17 fb 6a 4f 15 14 93 1d 46 11 f8 e2 d4 16 b4
TRACE :  1d 11 0e 98 e5 74 f6 cd 7c b2 5f f3 64 c0 b2 c9
TRACE : value of 'crt->rsa.E' (17 bits) is:
TRACE :  01 00 01
TRACE : own certificate #2:
..\..\library\ssl_tls.c(2207): cert. version : 3
..\..\library\ssl_tls.c(2207): serial number : 01
..\..\library\ssl_tls.c(2207): issuer name   : C=UK, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=root CA
..\..\library\ssl_tls.c(2207): subject name  : C=UK, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=root CA
..\..\library\ssl_tls.c(2207): issued  on    : 2013-09-21 18:07:00
..\..\library\ssl_tls.c(2207): expires on    : 2023-09-21 18:07:00
..\..\library\ssl_tls.c(2207): signed using  : RSA+SHA1
..\..\library\ssl_tls.c(2207): RSA key size  : 1024 bits
  ALL : 0000:  16 03 01 00 93
TRACE : client hello v3, message type: 22
TRACE : client hello v3, message len.: 147
TRACE : value of 'crt->rsa.N' (1024 bits) is:
  ALL : 0050:  00
DEBUG : => flush output
TRACE :  f2 84 d3 79 96 cf c7 09 61 87 a7 7c ed c3 da 0b
TRACE : client hello v3, protocol ver: [3:1]
DEBUG : message length: 86, out_left: 86
TRACE :  ce a8 d0 ec 51 7c 59 f5 18 29 6b 69 18 68 32 da
DEBUG : => fetch input
DEBUG : ssl->f_send (header)() returned 5 (0x5)
TRACE :  3a 96 06 d3 22 75 bf c2 68 95 af 36 aa f4 6b fd
DEBUG : in_left: 5, nb_want: 152
DEBUG : ssl->f_send() returned 81 (0x51)
TRACE :  cd 20 9f 74 c0 10 8a 17 17 30 ef 4f de 77 19 5c
DEBUG : ssl->f_recv() returned 147 (0x93)
DEBUG : <= flush output
TRACE :  f9 82 34 82 6f 3f 57 8c 05 a0 d1 26 b8 39 fb 93
DEBUG : <= fetch input
DEBUG : <= write record
TRACE :  15 59 0a b0 64 ba 04 50 f1 fe 34 34 77 2c 9e c0
  ALL : dumping 'record contents' (147 bytes)
  ALL : 0000:  01 00 00 8f 03 01 52 3d f3 a2 8c f1 23 af 37 89
  ALL : 0010:  82 66 f3 f1 19 8a 9b 95 dc 77 41 fc 61 db 54 6c
  ALL : 0020:  89 07 3c 4f 36 65 00 00 28 c0 0a c0 14 00 39 00
  ALL : 0030:  6b 00 35 00 3d c0 07 c0 09 c0 23 c0 11 c0 13 c0
TRACE :  9a 90 e8 22 91 cd 1a f9 c3 ee 9d c0 3d f9 47 c0
DEBUG : <= write server hello
  ALL : 0040:  27 00 33 00 67 00 32 00 05 00 04 00 2f 00 3c 00
TRACE :  4d fa 5b 64 a5 e1 57 b7 13 8f 2e 45 a9 96 ca 8d
DEBUG : server state: 3
  ALL : 0050:  0a 01 00 00 3e 00 00 00 0e 00 0c 00 00 09 6c 6f
TRACE : value of 'crt->rsa.E' (17 bits) is:
DEBUG : => flush output
  ALL : 0060:  63 61 6c 68 6f 73 74 ff 01 00 01 00 00 0a 00 08
TRACE :  01 00 01
DEBUG : <= flush output
  ALL : 0070:  00 06 00 17 00 18 00 19 00 0b 00 02 01 00 00 23
DEBUG : => write record
DEBUG : => write certificate
  ALL : 0080:  00 00 33 74 00 00 75 4f 00 00 00 05 00 05 01 00
TRACE : output record: msgtype = 22, version = [3:2], msglen = 1389
TRACE : own certificate #1:
..\..\library\ssl_tls.c(2207): cert. version : 3
..\..\library\ssl_tls.c(2207): serial number : 04
..\..\library\ssl_tls.c(2207): issuer name   : C=UK, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=root CA
..\..\library\ssl_tls.c(2207): subject name  : C=US, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=SERVER
..\..\library\ssl_tls.c(2207): issued  on    : 2013-09-21 18:10:00
..\..\library\ssl_tls.c(2207): expires on    : 2014-09-21 18:10:00
..\..\library\ssl_tls.c(2207): signed using  : RSA+SHA1
..\..\library\ssl_tls.c(2207): RSA key size  : 1024 bits
  ALL : 0090:  00 00 00
  ALL : dumping 'output record header sent to network' (5 bytes)
TRACE : value of 'crt->rsa.N' (1024 bits) is:
TRACE : client hello v3, handshake type: 1
  ALL : 0000:  16 03 02 05 6d
TRACE :  ba c9 d1 d6 a1 58 5c d7 46 c1 bf 16 67 f4 04 58
TRACE : client hello v3, handshake len.: 143
  ALL : dumping 'output record sent to network' (1389 bytes)
TRACE :  a1 1a 0a 7b eb 24 b4 07 b6 9e 93 c3 7c fe e6 cb
TRACE :  21 94 61 ba 57 b0 bf f6 31 33 5b b1 d0 e1 08 c5
TRACE :  26 a9 64 d7 76 0f 6c f3 3c 28 69 5a bd 4a ac a3
  ALL : 0000:  0b 00 05 69 00 05 66 00 02 b0 30 82 02 ac 30 82
TRACE : client hello v3, max. version: [3:1]
TRACE :  56 f1 c5 08 4f 61 c2 0e d9 d5 27 54 83 a0 e4 55
  ALL : 0010:  02 15 a0 03 02 01 02 02 01 04 30 0d 06 09 2a 86
TRACE : dumping 'client hello, random bytes' (32 bytes)
TRACE :  8b ff 59 d7 f6 eb 5d f6 b9 d3 e7 f5 2f 92 56 43
  ALL : 0020:  48 86 f7 0d 01 01 05 05 00 30 62 31 0b 30 09 06
TRACE : 0000:  52 3d f3 a2 8c f1 23 af 37 89 82 66 f3 f1 19 8a
TRACE :  ca 17 fb 6a 4f 15 14 93 1d 46 11 f8 e2 d4 16 b4
  ALL : 0030:  03 55 04 06 13 02 55 4b 31 0e 30 0c 06 03 55 04
TRACE : 0010:  9b 95 dc 77 41 fc 61 db 54 6c 89 07 3c 4f 36 65
TRACE :  1d 11 0e 98 e5 74 f6 cd 7c b2 5f f3 64 c0 b2 c9
  ALL : 0040:  08 13 05 53 54 41 54 45 31 0d 30 0b 06 03 55 04
TRACE : dumping 'client hello, session id' (0 bytes)
TRACE : value of 'crt->rsa.E' (17 bits) is:
  ALL : 0050:  07 13 04 43 69 74 79 31 0e 30 0c 06 03 55 04 0a
TRACE : dumping 'client hello, ciphersuitelist' (40 bytes)
TRACE :  01 00 01
  ALL : 0060:  13 05 4d 79 4f 72 67 31 12 30 10 06 03 55 04 0b
TRACE : 0000:  c0 0a c0 14 00 39 00 6b 00 35 00 3d c0 07 c0 09
TRACE : own certificate #2:
..\..\library\ssl_tls.c(2207): cert. version : 3
..\..\library\ssl_tls.c(2207): serial number : 01
..\..\library\ssl_tls.c(2207): issuer name   : C=UK, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=root CA
..\..\library\ssl_tls.c(2207): subject name  : C=UK, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=root CA
..\..\library\ssl_tls.c(2207): issued  on    : 2013-09-21 18:07:00
..\..\library\ssl_tls.c(2207): expires on    : 2023-09-21 18:07:00
..\..\library\ssl_tls.c(2207): signed using  : RSA+SHA1
..\..\library\ssl_tls.c(2207): RSA key size  : 1024 bits
  ALL : 0070:  13 09 4d 79 4f 72 67 55 6e 69 74 31 10 30 0e 06
TRACE : 0010:  c0 23 c0 11 c0 13 c0 27 00 33 00 67 00 32 00 05
TRACE : value of 'crt->rsa.N' (1024 bits) is:
  ALL : 0080:  03 55 04 03 13 07 72 6f 6f 74 20 43 41 30 1e 17
TRACE : 0020:  00 04 00 2f 00 3c 00 0a
TRACE :  f2 84 d3 79 96 cf c7 09 61 87 a7 7c ed c3 da 0b
  ALL : 0090:  0d 31 33 30 39 32 31 31 38 31 30 30 30 5a 17 0d
TRACE : dumping 'client hello, compression' (1 bytes)
TRACE :  ce a8 d0 ec 51 7c 59 f5 18 29 6b 69 18 68 32 da
  ALL : 00a0:  31 34 30 39 32 31 31 38 31 30 30 30 5a 30 65 31
TRACE : 0000:  00
TRACE :  3a 96 06 d3 22 75 bf c2 68 95 af 36 aa f4 6b fd
  ALL : 00b0:  0b 30 09 06 03 55 04 06 13 02 55 53 31 0e 30 0c
TRACE : found ServerName extension
TRACE :  cd 20 9f 74 c0 10 8a 17 17 30 ef 4f de 77 19 5c
  ALL : 00c0:  06 03 55 04 08 13 05 53 54 41 54 45 31 0d 30 0b
TRACE : found renegotiation extension
TRACE :  f9 82 34 82 6f 3f 57 8c 05 a0 d1 26 b8 39 fb 93
  ALL : 00d0:  06 03 55 04 07 13 04 43 69 74 79 31 0e 30 0c 06
TRACE : unknown extension found: 10 (ignoring)
TRACE :  15 59 0a b0 64 ba 04 50 f1 fe 34 34 77 2c 9e c0
  ALL : 00e0:  03 55 04 0a 13 05 4d 79 4f 72 67 31 12 30 10 06
TRACE : unknown extension found: 11 (ignoring)
TRACE :  9a 90 e8 22 91 cd 1a f9 c3 ee 9d c0 3d f9 47 c0
  ALL : 00f0:  03 55 04 0b 13 09 4d 79 4f 72 67 55 6e 69 74 31
TRACE : unknown extension found: 35 (ignoring)
TRACE :  4d fa 5b 64 a5 e1 57 b7 13 8f 2e 45 a9 96 ca 8d
  ALL : 0100:  13 30 11 06 03 55 04 03 13 0a 4d 43 53 41 47 46
TRACE : unknown extension found: 13172 (ignoring)
TRACE : value of 'crt->rsa.E' (17 bits) is:
  ALL : 0110:  43 4d 30 31 30 81 9f 30 0d 06 09 2a 86 48 86 f7
TRACE : unknown extension found: 30031 (ignoring)
TRACE :  01 00 01
  ALL : 0120:  0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81
TRACE : unknown extension found: 5 (ignoring)
DEBUG : => write record
  ALL : 0130:  00 ba c9 d1 d6 a1 58 5c d7 46 c1 bf 16 67 f4 04
DEBUG : <= parse client hello
TRACE : output record: msgtype = 22, version = [3:2], msglen = 1389
  ALL : 0140:  58 a1 1a 0a 7b eb 24 b4 07 b6 9e 93 c3 7c fe e6
  ALL : 0150:  cb 21 94 61 ba 57 b0 bf f6 31 33 5b b1 d0 e1 08
  ALL : dumping 'output record header sent to network' (5 bytes)
DEBUG : server state: 2
  ALL : 0160:  c5 26 a9 64 d7 76 0f 6c f3 3c 28 69 5a bd 4a ac
  ALL : 0000:  16 03 02 05 6d
DEBUG : => flush output
  ALL : 0170:  a3 56 f1 c5 08 4f 61 c2 0e d9 d5 27 54 83 a0 e4
  ALL : dumping 'output record sent to network' (1389 bytes)
DEBUG : <= flush output
  ALL : 0180:  55 8b ff 59 d7 f6 eb 5d f6 b9 d3 e7 f5 2f 92 56
  ALL : 0000:  0b 00 05 69 00 05 66 00 02 b0 30 82 02 ac 30 82
DEBUG : => write server hello
  ALL : 0190:  43 ca 17 fb 6a 4f 15 14 93 1d 46 11 f8 e2 d4 16
  ALL : 0010:  02 15 a0 03 02 01 02 02 01 04 30 0d 06 09 2a 86
TRACE : server hello, chosen version: [3:1]
  ALL : 01a0:  b4 1d 11 0e 98 e5 74 f6 cd 7c b2 5f f3 64 c0 b2
  ALL : 0020:  48 86 f7 0d 01 01 05 05 00 30 62 31 0b 30 09 06
  ALL : 0030:  03 55 04 06 13 02 55 4b 31 0e 30 0c 06 03 55 04
  ALL : 01b0:  c9 02 03 01 00 01 a3 6f 30 6d 30 0c 06 03 55 1d
TRACE : server hello, current time: 1379791778
  ALL : 0040:  08 13 05 53 54 41 54 45 31 0d 30 0b 06 03 55 04
  ALL : 01c0:  13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 0e 04
TRACE : dumping 'server hello, random bytes' (32 bytes)
  ALL : 0050:  07 13 04 43 69 74 79 31 0e 30 0c 06 03 55 04 0a
  ALL : 01d0:  16 04 14 c8 8a c1 d0 02 19 58 fe 86 b3 e6 95 b7
TRACE : 0000:  52 3d f3 a2 ae 0b a1 5e 49 41 5f 92 cc 2c fd 1f
  ALL : 0060:  13 05 4d 79 4f 72 67 31 12 30 10 06 03 55 04 0b
  ALL : 01e0:  1e 1d c3 f2 11 d0 34 30 0b 06 03 55 1d 0f 04 04
TRACE : 0010:  c2 ae 33 f4 bd c7 31 71 be aa b2 f8 e6 29 23 64
  ALL : 0070:  13 09 4d 79 4f 72 67 55 6e 69 74 31 10 30 0e 06
  ALL : 01f0:  03 02 05 e0 30 11 06 09 60 86 48 01 86 f8 42 01
TRACE : server hello, session id len.: 32
  ALL : 0080:  03 55 04 03 13 07 72 6f 6f 74 20 43 41 30 1e 17
  ALL : 0200:  01 04 04 03 02 06 40 30 1e 06 09 60 86 48 01 86
TRACE : dumping 'server hello, session id' (32 bytes)
  ALL : 0090:  0d 31 33 30 39 32 31 31 38 31 30 30 30 5a 17 0d
  ALL : 0210:  f8 42 01 0d 04 11 16 0f 78 63 61 20 63 65 72 74
TRACE : 0000:  fa 43 51 64 03 77 f9 4a f9 60 59 5c f5 6a f4 5e
  ALL : 00a0:  31 34 30 39 32 31 31 38 31 30 30 30 5a 30 65 31
  ALL : 0220:  69 66 69 63 61 74 65 30 0d 06 09 2a 86 48 86 f7
TRACE : 0010:  87 70 5a 92 12 c8 dc a6 28 65 b2 4b e2 ab 78 6e
  ALL : 00b0:  0b 30 09 06 03 55 04 06 13 02 55 53 31 0e 30 0c
  ALL : 0230:  0d 01 01 05 05 00 03 81 81 00 2e 5a b9 4e 1b ab
TRACE : no session has been resumed
  ALL : 00c0:  06 03 55 04 08 13 05 53 54 41 54 45 31 0d 30 0b
  ALL : 0240:  9d ea 2e 74 b9 25 c0 20 0d 08 52 c2 08 2f d4 39
TRACE : server hello, chosen ciphersuite: 107
  ALL : 00d0:  06 03 55 04 07 13 04 43 69 74 79 31 0e 30 0c 06
  ALL : 0250:  3a 16 21 e1 53 bb 86 09 cb c3 4c ba bf 31 94 77
  ALL : 0260:  64 9a ae fe cd 6b c9 c1 80 5d 8d 23 24 87 0f 8d
  ALL : 00e0:  03 55 04 0a 13 05 4d 79 4f 72 67 31 12 30 10 06
TRACE : server hello, compress alg.: 0
  ALL : 0270:  58 84 a9 2f b1 9b ec c9 83 4c 53 44 55 0e 30 52
  ALL : 00f0:  03 55 04 0b 13 09 4d 79 4f 72 67 55 6e 69 74 31
TRACE : server hello, prepping for secure renegotiation extension
  ALL : 0280:  ed cd dc 2a 89 40 07 c6 81 d3 ec a9 17 80 c5 2f
  ALL : 0100:  13 30 11 06 03 55 04 03 13 0a 4d 43 53 41 47 46
TRACE : server hello, total extension length: 5
  ALL : 0290:  cc a8 1c 46 94 71 e5 f6 92 de 88 a2 c8 bc a0 24
  ALL : 0110:  43 4d 30 31 30 81 9f 30 0d 06 09 2a 86 48 86 f7
TRACE : client hello, secure renegotiation extension
  ALL : 02a0:  c4 be cc 16 0c 6e f8 a8 df 8a 9f ed 78 c0 80 83
  ALL : 0120:  0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81
DEBUG : => write record
  ALL : 02b0:  5c 58 86 eb 06 43 a5 08 4b 25 00 02 b0 30 82 02
  ALL : 0130:  00 ba c9 d1 d6 a1 58 5c d7 46 c1 bf 16 67 f4 04
TRACE : output record: msgtype = 22, version = [3:1], msglen = 81
  ALL : 02c0:  ac 30 82 02 15 a0 03 02 01 02 02 01 01 30 0d 06
  ALL : 0140:  58 a1 1a 0a 7b eb 24 b4 07 b6 9e 93 c3 7c fe e6
  ALL : dumping 'output record header sent to network' (5 bytes)
  ALL : 02d0:  09 2a 86 48 86 f7 0d 01 01 05 05 00 30 62 31 0b
  ALL : 0150:  cb 21 94 61 ba 57 b0 bf f6 31 33 5b b1 d0 e1 08
  ALL : 0000:  16 03 01 00 51
  ALL : 02e0:  30 09 06 03 55 04 06 13 02 55 4b 31 0e 30 0c 06
  ALL : 0160:  c5 26 a9 64 d7 76 0f 6c f3 3c 28 69 5a bd 4a ac
  ALL : dumping 'output record sent to network' (81 bytes)
  ALL : 02f0:  03 55 04 08 13 05 53 54 41 54 45 31 0d 30 0b 06
  ALL : 0170:  a3 56 f1 c5 08 4f 61 c2 0e d9 d5 27 54 83 a0 e4
  ALL : 0000:  02 00 00 4d 03 01 52 3d f3 a2 ae 0b a1 5e 49 41
  ALL : 0300:  03 55 04 07 13 04 43 69 74 79 31 0e 30 0c 06 03
  ALL : 0180:  55 8b ff 59 d7 f6 eb 5d f6 b9 d3 e7 f5 2f 92 56
  ALL : 0010:  5f 92 cc 2c fd 1f c2 ae 33 f4 bd c7 31 71 be aa
  ALL : 0310:  55 04 0a 13 05 4d 79 4f 72 67 31 12 30 10 06 03
  ALL : 0190:  43 ca 17 fb 6a 4f 15 14 93 1d 46 11 f8 e2 d4 16
  ALL : 0020:  b2 f8 e6 29 23 64 20 fa 43 51 64 03 77 f9 4a f9
  ALL : 0320:  55 04 0b 13 09 4d 79 4f 72 67 55 6e 69 74 31 10
  ALL : 01a0:  b4 1d 11 0e 98 e5 74 f6 cd 7c b2 5f f3 64 c0 b2
  ALL : 0030:  60 59 5c f5 6a f4 5e 87 70 5a 92 12 c8 dc a6 28
  ALL : 0330:  30 0e 06 03 55 04 03 13 07 72 6f 6f 74 20 43 41
  ALL : 01b0:  c9 02 03 01 00 01 a3 6f 30 6d 30 0c 06 03 55 1d
  ALL : 0040:  65 b2 4b e2 ab 78 6e 00 6b 00 00 05 ff 01 00 01
  ALL : 0340:  30 1e 17 0d 31 33 30 39 32 31 31 38 30 37 30 30
  ALL : 01c0:  13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 0e 04
  ALL : 01d0:  16 04 14 c8 8a c1 d0 02 19 58 fe 86 b3 e6 95 b7
  ALL : 01e0:  1e 1d c3 f2 11 d0 34 30 0b 06 03 55 1d 0f 04 04
  ALL : 0350:  5a 17 0d 32 33 30 39 32 31 31 38 30 37 30 30 5a
  ALL : 0050:  00
  ALL : 01f0:  03 02 05 e0 30 11 06 09 60 86 48 01 86 f8 42 01
  ALL : 0360:  30 62 31 0b 30 09 06 03 55 04 06 13 02 55 4b 31
DEBUG : => flush output
  ALL : 0200:  01 04 04 03 02 06 40 30 1e 06 09 60 86 48 01 86
  ALL : 0370:  0e 30 0c 06 03 55 04 08 13 05 53 54 41 54 45 31
DEBUG : message length: 86, out_left: 86
  ALL : 0210:  f8 42 01 0d 04 11 16 0f 78 63 61 20 63 65 72 74
  ALL : 0380:  0d 30 0b 06 03 55 04 07 13 04 43 69 74 79 31 0e
DEBUG : ssl->f_send (header)() returned 5 (0x5)
  ALL : 0220:  69 66 69 63 61 74 65 30 0d 06 09 2a 86 48 86 f7
  ALL : 0390:  30 0c 06 03 55 04 0a 13 05 4d 79 4f 72 67 31 12
DEBUG : ssl->f_send() returned 81 (0x51)
  ALL : 0230:  0d 01 01 05 05 00 03 81 81 00 2e 5a b9 4e 1b ab
  ALL : 0240:  9d ea 2e 74 b9 25 c0 20 0d 08 52 c2 08 2f d4 39
  ALL : 03a0:  30 10 06 03 55 04 0b 13 09 4d 79 4f 72 67 55 6e
  ALL : 03b0:  69 74 31 10 30 0e 06 03 55 04 03 13 07 72 6f 6f
  ALL : 03c0:  74 20 43 41 30 81 9f 30 0d 06 09 2a 86 48 86 f7
  ALL : 03d0:  0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81
  ALL : 03e0:  00 f2 84 d3 79 96 cf c7 09 61 87 a7 7c ed c3 da
  ALL : 03f0:  0b ce a8 d0 ec 51 7c 59 f5 18 29 6b 69 18 68 32
  ALL : 0400:  da 3a 96 06 d3 22 75 bf c2 68 95 af 36 aa f4 6b
DEBUG : => handshake
DEBUG : server state: 0
DEBUG : <= flush output
  ALL : 0410:  fd cd 20 9f 74 c0 10 8a 17 17 30 ef 4f de 77 19
  ALL : 0250:  3a 16 21 e1 53 bb 86 09 cb c3 4c ba bf 31 94 77
  ALL : 0260:  64 9a ae fe cd 6b c9 c1 80 5d 8d 23 24 87 0f 8d
DEBUG : <= write record
  ALL : 0420:  5c f9 82 34 82 6f 3f 57 8c 05 a0 d1 26 b8 39 fb
DEBUG : => flush output
DEBUG : <= flush output
DEBUG : <= write server hello
  ALL : 0430:  93 15 59 0a b0 64 ba 04 50 f1 fe 34 34 77 2c 9e
  ALL : 0270:  58 84 a9 2f b1 9b ec c9 83 4c 53 44 55 0e 30 52
  ALL : 0280:  ed cd dc 2a 89 40 07 c6 81 d3 ec a9 17 80 c5 2f
DEBUG : server state: 3
  ALL : 0440:  c0 9a 90 e8 22 91 cd 1a f9 c3 ee 9d c0 3d f9 47
DEBUG : server state: 1
DEBUG : => flush output
DEBUG : => flush output
  ALL : 0450:  c0 4d fa 5b 64 a5 e1 57 b7 13 8f 2e 45 a9 96 ca
  ALL : 0290:  cc a8 1c 46 94 71 e5 f6 92 de 88 a2 c8 bc a0 24
  ALL : 02a0:  c4 be cc 16 0c 6e f8 a8 df 8a 9f ed 78 c0 80 83
DEBUG : <= flush output
  ALL : 0460:  8d 02 03 01 00 01 a3 72 30 70 30 0f 06 03 55 1d
DEBUG : <= flush output
DEBUG : => parse client hello
DEBUG : => write certificate
  ALL : 0470:  13 01 01 ff 04 05 30 03 01 01 ff 30 1d 06 03 55
  ALL : 02b0:  5c 58 86 eb 06 43 a5 08 4b 25 00 02 b0 30 82 02
  ALL : 02c0:  ac 30 82 02 15 a0 03 02 01 02 02 01 01 30 0d 06
TRACE : own certificate #1:
..\..\library\ssl_tls.c(2207): cert. version : 3
..\..\library\ssl_tls.c(2207): serial number : 04
..\..\library\ssl_tls.c(2207): issuer name   : C=UK, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=root CA
..\..\library\ssl_tls.c(2207): subject name  : C=US, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=SERVER
..\..\library\ssl_tls.c(2207): issued  on    : 2013-09-21 18:10:00
..\..\library\ssl_tls.c(2207): expires on    : 2014-09-21 18:10:00
..\..\library\ssl_tls.c(2207): signed using  : RSA+SHA1
..\..\library\ssl_tls.c(2207): RSA key size  : 1024 bits
  ALL : 0480:  1d 0e 04 16 04 14 b9 0c 04 8f 50 20 aa 42 46 18
DEBUG : => fetch input
DEBUG : in_left: 0, nb_want: 5
TRACE : value of 'crt->rsa.N' (1024 bits) is:
  ALL : 0490:  45 f9 bf 70 fc c8 c3 56 ce 7c 30 0b 06 03 55 1d
  ALL : 02d0:  09 2a 86 48 86 f7 0d 01 01 05 05 00 30 62 31 0b
  ALL : 02e0:  30 09 06 03 55 04 06 13 02 55 4b 31 0e 30 0c 06
TRACE :  ba c9 d1 d6 a1 58 5c d7 46 c1 bf 16 67 f4 04 58
  ALL : 04a0:  0f 04 04 03 02 01 06 30 11 06 09 60 86 48 01 86
DEBUG : ssl->f_recv() returned 5 (0x5)
  ALL : 02f0:  03 55 04 08 13 05 53 54 41 54 45 31 0d 30 0b 06
TRACE :  a1 1a 0a 7b eb 24 b4 07 b6 9e 93 c3 7c fe e6 cb
  ALL : 04b0:  f8 42 01 01 04 04 03 02 00 07 30 1e 06 09 60 86
DEBUG : <= fetch input
  ALL : dumping 'record header' (5 bytes)
TRACE :  21 94 61 ba 57 b0 bf f6 31 33 5b b1 d0 e1 08 c5
  ALL : 04c0:  48 01 86 f8 42 01 0d 04 11 16 0f 78 63 61 20 63
  ALL : 0300:  03 55 04 07 13 04 43 69 74 79 31 0e 30 0c 06 03
  ALL : 0310:  55 04 0a 13 05 4d 79 4f 72 67 31 12 30 10 06 03
  ALL : 0320:  55 04 0b 13 09 4d 79 4f 72 67 55 6e 69 74 31 10
  ALL : 0330:  30 0e 06 03 55 04 03 13 07 72 6f 6f 74 20 43 41
  ALL : 04d0:  65 72 74 69 66 69 63 61 74 65 30 0d 06 09 2a 86
  ALL : 0000:  16 03 00 00 45
TRACE :  26 a9 64 d7 76 0f 6c f3 3c 28 69 5a bd 4a ac a3
  ALL : 0340:  30 1e 17 0d 31 33 30 39 32 31 31 38 30 37 30 30
  ALL : 04e0:  48 86 f7 0d 01 01 05 05 00 03 81 81 00 b5 bb bc
TRACE : client hello v3, message type: 22
TRACE :  56 f1 c5 08 4f 61 c2 0e d9 d5 27 54 83 a0 e4 55
  ALL : 0350:  5a 17 0d 32 33 30 39 32 31 31 38 30 37 30 30 5a
  ALL : 04f0:  9e 8a 6b 5e 97 c2 70 1b 77 db c8 ee 48 8e ed 4d
TRACE : client hello v3, message len.: 69
TRACE :  8b ff 59 d7 f6 eb 5d f6 b9 d3 e7 f5 2f 92 56 43
  ALL : 0360:  30 62 31 0b 30 09 06 03 55 04 06 13 02 55 4b 31
  ALL : 0500:  0c 9c 23 0a 2c 7d b2 5a 9a d8 36 15 5f f7 82 e4
TRACE : client hello v3, protocol ver: [3:0]
TRACE :  ca 17 fb 6a 4f 15 14 93 1d 46 11 f8 e2 d4 16 b4
TRACE :  1d 11 0e 98 e5 74 f6 cd 7c b2 5f f3 64 c0 b2 c9
  ALL : 0510:  93 57 3c 24 8c 3c 30 b2 7f d8 16 cd 22 32 bf 6c
DEBUG : => fetch input
DEBUG : in_left: 5, nb_want: 74
TRACE : value of 'crt->rsa.E' (17 bits) is:
  ALL : 0520:  be dc 2f da bb 71 2d d2 72 76 47 52 9b 64 12 eb
  ALL : 0370:  0e 30 0c 06 03 55 04 08 13 05 53 54 41 54 45 31
  ALL : 0380:  0d 30 0b 06 03 55 04 07 13 04 43 69 74 79 31 0e
TRACE :  01 00 01
  ALL : 0530:  42 cb c7 38 9e 5c 93 08 05 a6 e1 4b d8 81 1c 2b
DEBUG : ssl->f_recv() returned 69 (0x45)
DEBUG : <= fetch input
  ALL : dumping 'record contents' (69 bytes)
  ALL : 0540:  d8 64 e2 72 4a 4f 0c 3c 85 ca f1 ab ec 4b c1 fc
  ALL : 0390:  30 0c 06 03 55 04 0a 13 05 4d 79 4f 72 67 31 12
TRACE : own certificate #2:
..\..\library\ssl_tls.c(2207): cert. version : 3
..\..\library\ssl_tls.c(2207): serial number : 01
..\..\library\ssl_tls.c(2207): issuer name   : C=UK, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=root CA
..\..\library\ssl_tls.c(2207): subject name  : C=UK, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=root CA
..\..\library\ssl_tls.c(2207): issued  on    : 2013-09-21 18:07:00
..\..\library\ssl_tls.c(2207): expires on    : 2023-09-21 18:07:00
..\..\library\ssl_tls.c(2207): signed using  : RSA+SHA1
..\..\library\ssl_tls.c(2207): RSA key size  : 1024 bits
  ALL : 0000:  01 00 00 41 03 00 52 3d f3 a2 fd 14 c5 55 a9 2c
  ALL : 0550:  4d b3 0c fa 1f 01 b9 1c f3 f6 bf e0 8e 66 c2 c7
  ALL : 03a0:  30 10 06 03 55 04 0b 13 09 4d 79 4f 72 67 55 6e
  ALL : 03b0:  69 74 31 10 30 0e 06 03 55 04 03 13 07 72 6f 6f
  ALL : 03c0:  74 20 43 41 30 81 9f 30 0d 06 09 2a 86 48 86 f7
  ALL : 03d0:  0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81
  ALL : 0560:  1f aa 96 16 7e 99 ab 36 15 6a f3 7b 28
DEBUG : => flush output
  ALL : 0010:  d1 8b b5 2d 2c 01 dd 87 1e 20 e3 9b a5 98 13 b7
  ALL : 0020:  f5 28 d1 83 84 d5 00 00 1a 00 ff 00 39 00 6b 00
  ALL : 0030:  35 00 3d 00 33 00 67 00 32 00 05 00 04 00 2f 00
  ALL : 0040:  3c 00 0a 01 00
DEBUG : message length: 1394, out_left: 1394
  ALL : 03e0:  00 f2 84 d3 79 96 cf c7 09 61 87 a7 7c ed c3 da
  ALL : 03f0:  0b ce a8 d0 ec 51 7c 59 f5 18 29 6b 69 18 68 32
  ALL : 0400:  da 3a 96 06 d3 22 75 bf c2 68 95 af 36 aa f4 6b
DEBUG : ssl->f_send (header)() returned 5 (0x5)
TRACE : value of 'crt->rsa.N' (1024 bits) is:
TRACE : client hello v3, handshake type: 1
TRACE : client hello v3, handshake len.: 65
DEBUG : Can't write data on socket : An established connection was aborted by the software in your host machine.
DEBUG : ssl->f_send() returned -78 (0xffffffb2)
  ALL : 0410:  fd cd 20 9f 74 c0 10 8a 17 17 30 ef 4f de 77 19
  ALL : 0420:  5c f9 82 34 82 6f 3f 57 8c 05 a0 d1 26 b8 39 fb
  ALL : 0430:  93 15 59 0a b0 64 ba 04 50 f1 fe 34 34 77 2c 9e
  ALL : 0440:  c0 9a 90 e8 22 91 cd 1a f9 c3 ee 9d c0 3d f9 47
DEBUG : ssl_flush_output() returned -78 (0xffffffb2)
TRACE : client hello v3, max. version: [3:0]
TRACE :  f2 84 d3 79 96 cf c7 09 61 87 a7 7c ed c3 da 0b
TRACE :  ce a8 d0 ec 51 7c 59 f5 18 29 6b 69 18 68 32 da
DEBUG : ssl_write_record() returned -78 (0xffffffb2)
TRACE : dumping 'client hello, random bytes' (32 bytes)
TRACE : 0000:  52 3d f3 a2 fd 14 c5 55 a9 2c d1 8b b5 2d 2c 01
TRACE :  3a 96 06 d3 22 75 bf c2 68 95 af 36 aa f4 6b fd
DEBUG : <= handshake
  ALL : 0450:  c0 4d fa 5b 64 a5 e1 57 b7 13 8f 2e 45 a9 96 ca
  ALL : 0460:  8d 02 03 01 00 01 a3 72 30 70 30 0f 06 03 55 1d
TRACE :  cd 20 9f 74 c0 10 8a 17 17 30 ef 4f de 77 19 5c
DEBUG : Exception (78) : SSL server handshake failed : NET - Sending information through the socket failed
TRACE : 0010:  dd 87 1e 20 e3 9b a5 98 13 b7 f5 28 d1 83 84 d5
TRACE : dumping 'client hello, session id' (0 bytes)
TRACE :  f9 82 34 82 6f 3f 57 8c 05 a0 d1 26 b8 39 fb 93
  ALL : 0470:  13 01 01 ff 04 05 30 03 01 01 ff 30 1d 06 03 55
  ALL : 0480:  1d 0e 04 16 04 14 b9 0c 04 8f 50 20 aa 42 46 18
TRACE :  15 59 0a b0 64 ba 04 50 f1 fe 34 34 77 2c 9e c0
TRACE :  9a 90 e8 22 91 cd 1a f9 c3 ee 9d c0 3d f9 47 c0
  ALL : 0490:  45 f9 bf 70 fc c8 c3 56 ce 7c 30 0b 06 03 55 1d
  ALL : 04a0:  0f 04 04 03 02 01 06 30 11 06 09 60 86 48 01 86
TRACE :  4d fa 5b 64 a5 e1 57 b7 13 8f 2e 45 a9 96 ca 8d
TRACE : dumping 'client hello, ciphersuitelist' (26 bytes)
TRACE : 0000:  00 ff 00 39 00 6b 00 35 00 3d 00 33 00 67 00 32
TRACE : value of 'crt->rsa.E' (17 bits) is:
  ALL : 04b0:  f8 42 01 01 04 04 03 02 00 07 30 1e 06 09 60 86
  ALL : 04c0:  48 01 86 f8 42 01 0d 04 11 16 0f 78 63 61 20 63
TRACE :  01 00 01
TRACE : 0010:  00 05 00 04 00 2f 00 3c 00 0a
TRACE : dumping 'client hello, compression' (1 bytes)
DEBUG : => write record
  ALL : 04d0:  65 72 74 69 66 69 63 61 74 65 30 0d 06 09 2a 86
  ALL : 04e0:  48 86 f7 0d 01 01 05 05 00 03 81 81 00 b5 bb bc
  ALL : 04f0:  9e 8a 6b 5e 97 c2 70 1b 77 db c8 ee 48 8e ed 4d
  ALL : 0500:  0c 9c 23 0a 2c 7d b2 5a 9a d8 36 15 5f f7 82 e4
  ALL : 0510:  93 57 3c 24 8c 3c 30 b2 7f d8 16 cd 22 32 bf 6c
TRACE : output record: msgtype = 22, version = [3:1], msglen = 1389
TRACE : 0000:  00
TRACE : received TLS_EMPTY_RENEGOTIATION_INFO
  ALL : dumping 'output record header sent to network' (5 bytes)
  ALL : 0520:  be dc 2f da bb 71 2d d2 72 76 47 52 9b 64 12 eb
  ALL : 0530:  42 cb c7 38 9e 5c 93 08 05 a6 e1 4b d8 81 1c 2b
  ALL : 0000:  16 03 01 05 6d
DEBUG : <= parse client hello
DEBUG : server state: 2
  ALL : dumping 'output record sent to network' (1389 bytes)
  ALL : 0540:  d8 64 e2 72 4a 4f 0c 3c 85 ca f1 ab ec 4b c1 fc
  ALL : 0550:  4d b3 0c fa 1f 01 b9 1c f3 f6 bf e0 8e 66 c2 c7
  ALL : 0000:  0b 00 05 69 00 05 66 00 02 b0 30 82 02 ac 30 82
DEBUG : => flush output
DEBUG : <= flush output
  ALL : 0010:  02 15 a0 03 02 01 02 02 01 04 30 0d 06 09 2a 86
  ALL : 0560:  1f aa 96 16 7e 99 ab 36 15 6a f3 7b 28
  ALL : 0020:  48 86 f7 0d 01 01 05 05 00 30 62 31 0b 30 09 06
DEBUG : => flush output
DEBUG : message length: 1394, out_left: 1394
  ALL : 0030:  03 55 04 06 13 02 55 4b 31 0e 30 0c 06 03 55 04
DEBUG : => write server hello
TRACE : server hello, chosen version: [3:0]
  ALL : 0040:  08 13 05 53 54 41 54 45 31 0d 30 0b 06 03 55 04
DEBUG : ssl->f_send (header)() returned 5 (0x5)
DEBUG : => free
  ALL : 0050:  07 13 04 43 69 74 79 31 0e 30 0c 06 03 55 04 0a
DEBUG : Can't write data on socket : An established connection was aborted by the software in your host machine.
DEBUG : ssl->f_send() returned -78 (0xffffffb2)
DEBUG : <= free
  ALL : 0060:  13 05 4d 79 4f 72 67 31 12 30 10 06 03 55 04 0b
TRACE : server hello, current time: 1379791779
TRACE : dumping 'server hello, random bytes' (32 bytes)
  ALL : 0070:  13 09 4d 79 4f 72 67 55 6e 69 74 31 10 30 0e 06
DEBUG : ssl_flush_output() returned -78 (0xffffffb2)
DEBUG : ssl_write_record() returned -78 (0xffffffb2)
  ALL : 0080:  03 55 04 03 13 07 72 6f 6f 74 20 43 41 30 1e 17
TRACE : 0000:  52 3d f3 a3 4a b0 fb 58 1f 8e 38 b9 04 c4 9c 2c
TRACE : 0010:  1f ac b7 55 45 5d 6c 37 85 bb 97 3e 5b ad 4b 79
TRACE : server hello, session id len.: 32
TRACE : dumping 'server hello, session id' (32 bytes)
  ALL : 0090:  0d 31 33 30 39 32 31 31 38 31 30 30 30 5a 17 0d
DEBUG : <= handshake
DEBUG : Exception (78) : SSL server handshake failed : NET - Sending information through the socket failed
  ALL : 00a0:  31 34 30 39 32 31 31 38 31 30 30 30 5a 30 65 31
TRACE : 0000:  d6 04 26 8b 6b 06 5b 57 9f 80 7d 58 0f ab ea 2a
TRACE : 0010:  b7 a5 c2 a4 42 57 1c 59 7f ff d6 17 9e 42 1c 86
TRACE : no session has been resumed
  ALL : 00b0:  0b 30 09 06 03 55 04 06 13 02 55 53 31 0e 30 0c
TRACE : server hello, chosen ciphersuite: 107
  ALL : 00c0:  06 03 55 04 08 13 05 53 54 41 54 45 31 0d 30 0b
TRACE : server hello, compress alg.: 0
  ALL : 00d0:  06 03 55 04 07 13 04 43 69 74 79 31 0e 30 0c 06
TRACE : server hello, prepping for secure renegotiation extension
  ALL : 00e0:  03 55 04 0a 13 05 4d 79 4f 72 67 31 12 30 10 06
TRACE : server hello, total extension length: 5
  ALL : 00f0:  03 55 04 0b 13 09 4d 79 4f 72 67 55 6e 69 74 31
TRACE : client hello, secure renegotiation extension
  ALL : 0100:  13 30 11 06 03 55 04 03 13 0a 4d 43 53 41 47 46
DEBUG : => write record
  ALL : 0110:  43 4d 30 31 30 81 9f 30 0d 06 09 2a 86 48 86 f7
TRACE : output record: msgtype = 22, version = [3:0], msglen = 81
  ALL : 0120:  0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81
  ALL : dumping 'output record header sent to network' (5 bytes)
  ALL : 0130:  00 ba c9 d1 d6 a1 58 5c d7 46 c1 bf 16 67 f4 04
  ALL : 0000:  16 03 00 00 51
  ALL : 0140:  58 a1 1a 0a 7b eb 24 b4 07 b6 9e 93 c3 7c fe e6
  ALL : dumping 'output record sent to network' (81 bytes)
  ALL : 0150:  cb 21 94 61 ba 57 b0 bf f6 31 33 5b b1 d0 e1 08
  ALL : 0000:  02 00 00 4d 03 00 52 3d f3 a3 4a b0 fb 58 1f 8e
  ALL : 0160:  c5 26 a9 64 d7 76 0f 6c f3 3c 28 69 5a bd 4a ac
  ALL : 0010:  38 b9 04 c4 9c 2c 1f ac b7 55 45 5d 6c 37 85 bb
  ALL : 0170:  a3 56 f1 c5 08 4f 61 c2 0e d9 d5 27 54 83 a0 e4
  ALL : 0020:  97 3e 5b ad 4b 79 20 d6 04 26 8b 6b 06 5b 57 9f
  ALL : 0180:  55 8b ff 59 d7 f6 eb 5d f6 b9 d3 e7 f5 2f 92 56
  ALL : 0030:  80 7d 58 0f ab ea 2a b7 a5 c2 a4 42 57 1c 59 7f
  ALL : 0190:  43 ca 17 fb 6a 4f 15 14 93 1d 46 11 f8 e2 d4 16
  ALL : 0040:  ff d6 17 9e 42 1c 86 00 6b 00 00 05 ff 01 00 01
  ALL : 01a0:  b4 1d 11 0e 98 e5 74 f6 cd 7c b2 5f f3 64 c0 b2
  ALL : 0050:  00
  ALL : 01b0:  c9 02 03 01 00 01 a3 6f 30 6d 30 0c 06 03 55 1d
DEBUG : => flush output
DEBUG : message length: 86, out_left: 86
  ALL : 01c0:  13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 0e 04
DEBUG : ssl->f_send (header)() returned 5 (0x5)
  ALL : 01d0:  16 04 14 c8 8a c1 d0 02 19 58 fe 86 b3 e6 95 b7
  ALL : 01e0:  1e 1d c3 f2 11 d0 34 30 0b 06 03 55 1d 0f 04 04
  ALL : 01f0:  03 02 05 e0 30 11 06 09 60 86 48 01 86 f8 42 01
  ALL : 0200:  01 04 04 03 02 06 40 30 1e 06 09 60 86 48 01 86
  ALL : 0210:  f8 42 01 0d 04 11 16 0f 78 63 61 20 63 65 72 74
  ALL : 0220:  69 66 69 63 61 74 65 30 0d 06 09 2a 86 48 86 f7
  ALL : 0230:  0d 01 01 05 05 00 03 81 81 00 2e 5a b9 4e 1b ab
  ALL : 0240:  9d ea 2e 74 b9 25 c0 20 0d 08 52 c2 08 2f d4 39
  ALL : 0250:  3a 16 21 e1 53 bb 86 09 cb c3 4c ba bf 31 94 77
  ALL : 0260:  64 9a ae fe cd 6b c9 c1 80 5d 8d 23 24 87 0f 8d
  ALL : 0270:  58 84 a9 2f b1 9b ec c9 83 4c 53 44 55 0e 30 52
  ALL : 0280:  ed cd dc 2a 89 40 07 c6 81 d3 ec a9 17 80 c5 2f
DEBUG : ssl->f_send() returned 81 (0x51)
DEBUG : <= flush output
DEBUG : <= write record
DEBUG : <= write server hello
  ALL : 0290:  cc a8 1c 46 94 71 e5 f6 92 de 88 a2 c8 bc a0 24
DEBUG : => free
DEBUG : <= free
  ALL : 02a0:  c4 be cc 16 0c 6e f8 a8 df 8a 9f ed 78 c0 80 83
  ALL : 02b0:  5c 58 86 eb 06 43 a5 08 4b 25 00 02 b0 30 82 02
  ALL : 02c0:  ac 30 82 02 15 a0 03 02 01 02 02 01 01 30 0d 06
  ALL : 02d0:  09 2a 86 48 86 f7 0d 01 01 05 05 00 30 62 31 0b
DEBUG : server state: 3
  ALL : 02e0:  30 09 06 03 55 04 06 13 02 55 4b 31 0e 30 0c 06
DEBUG : => flush output
  ALL : 02f0:  03 55 04 08 13 05 53 54 41 54 45 31 0d 30 0b 06
DEBUG : <= flush output
  ALL : 0300:  03 55 04 07 13 04 43 69 74 79 31 0e 30 0c 06 03
DEBUG : => write certificate
  ALL : 0310:  55 04 0a 13 05 4d 79 4f 72 67 31 12 30 10 06 03
TRACE : own certificate #1:
..\..\library\ssl_tls.c(2207): cert. version : 3
..\..\library\ssl_tls.c(2207): serial number : 04
..\..\library\ssl_tls.c(2207): issuer name   : C=UK, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=root CA
..\..\library\ssl_tls.c(2207): subject name  : C=US, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=SERVER
..\..\library\ssl_tls.c(2207): issued  on    : 2013-09-21 18:10:00
..\..\library\ssl_tls.c(2207): expires on    : 2014-09-21 18:10:00
..\..\library\ssl_tls.c(2207): signed using  : RSA+SHA1
..\..\library\ssl_tls.c(2207): RSA key size  : 1024 bits
  ALL : 0320:  55 04 0b 13 09 4d 79 4f 72 67 55 6e 69 74 31 10
TRACE : value of 'crt->rsa.N' (1024 bits) is:
  ALL : 0330:  30 0e 06 03 55 04 03 13 07 72 6f 6f 74 20 43 41
TRACE :  ba c9 d1 d6 a1 58 5c d7 46 c1 bf 16 67 f4 04 58
  ALL : 0340:  30 1e 17 0d 31 33 30 39 32 31 31 38 30 37 30 30
TRACE :  a1 1a 0a 7b eb 24 b4 07 b6 9e 93 c3 7c fe e6 cb
  ALL : 0350:  5a 17 0d 32 33 30 39 32 31 31 38 30 37 30 30 5a
TRACE :  21 94 61 ba 57 b0 bf f6 31 33 5b b1 d0 e1 08 c5
  ALL : 0360:  30 62 31 0b 30 09 06 03 55 04 06 13 02 55 4b 31
TRACE :  26 a9 64 d7 76 0f 6c f3 3c 28 69 5a bd 4a ac a3
  ALL : 0370:  0e 30 0c 06 03 55 04 08 13 05 53 54 41 54 45 31
TRACE :  56 f1 c5 08 4f 61 c2 0e d9 d5 27 54 83 a0 e4 55
  ALL : 0380:  0d 30 0b 06 03 55 04 07 13 04 43 69 74 79 31 0e
TRACE :  8b ff 59 d7 f6 eb 5d f6 b9 d3 e7 f5 2f 92 56 43
  ALL : 0390:  30 0c 06 03 55 04 0a 13 05 4d 79 4f 72 67 31 12
TRACE :  ca 17 fb 6a 4f 15 14 93 1d 46 11 f8 e2 d4 16 b4
  ALL : 03a0:  30 10 06 03 55 04 0b 13 09 4d 79 4f 72 67 55 6e
TRACE :  1d 11 0e 98 e5 74 f6 cd 7c b2 5f f3 64 c0 b2 c9
  ALL : 03b0:  69 74 31 10 30 0e 06 03 55 04 03 13 07 72 6f 6f
TRACE : value of 'crt->rsa.E' (17 bits) is:
  ALL : 03c0:  74 20 43 41 30 81 9f 30 0d 06 09 2a 86 48 86 f7
TRACE :  01 00 01
  ALL : 03d0:  0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81
TRACE : own certificate #2:
..\..\library\ssl_tls.c(2207): cert. version : 3
..\..\library\ssl_tls.c(2207): serial number : 01
..\..\library\ssl_tls.c(2207): issuer name   : C=UK, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=root CA
..\..\library\ssl_tls.c(2207): subject name  : C=UK, ST=STATE, L=City, O=MyOrg, OU=MyOrgUnit, CN=root CA
..\..\library\ssl_tls.c(2207): issued  on    : 2013-09-21 18:07:00
..\..\library\ssl_tls.c(2207): expires on    : 2023-09-21 18:07:00
..\..\library\ssl_tls.c(2207): signed using  : RSA+SHA1
..\..\library\ssl_tls.c(2207): RSA key size  : 1024 bits
  ALL : 03e0:  00 f2 84 d3 79 96 cf c7 09 61 87 a7 7c ed c3 da
TRACE : value of 'crt->rsa.N' (1024 bits) is:
  ALL : 03f0:  0b ce a8 d0 ec 51 7c 59 f5 18 29 6b 69 18 68 32
TRACE :  f2 84 d3 79 96 cf c7 09 61 87 a7 7c ed c3 da 0b
  ALL : 0400:  da 3a 96 06 d3 22 75 bf c2 68 95 af 36 aa f4 6b
TRACE :  ce a8 d0 ec 51 7c 59 f5 18 29 6b 69 18 68 32 da
  ALL : 0410:  fd cd 20 9f 74 c0 10 8a 17 17 30 ef 4f de 77 19
TRACE :  3a 96 06 d3 22 75 bf c2 68 95 af 36 aa f4 6b fd
  ALL : 0420:  5c f9 82 34 82 6f 3f 57 8c 05 a0 d1 26 b8 39 fb
TRACE :  cd 20 9f 74 c0 10 8a 17 17 30 ef 4f de 77 19 5c
  ALL : 0430:  93 15 59 0a b0 64 ba 04 50 f1 fe 34 34 77 2c 9e
TRACE :  f9 82 34 82 6f 3f 57 8c 05 a0 d1 26 b8 39 fb 93
  ALL : 0440:  c0 9a 90 e8 22 91 cd 1a f9 c3 ee 9d c0 3d f9 47
TRACE :  15 59 0a b0 64 ba 04 50 f1 fe 34 34 77 2c 9e c0
TRACE :  9a 90 e8 22 91 cd 1a f9 c3 ee 9d c0 3d f9 47 c0
  ALL : 0450:  c0 4d fa 5b 64 a5 e1 57 b7 13 8f 2e 45 a9 96 ca
TRACE :  4d fa 5b 64 a5 e1 57 b7 13 8f 2e 45 a9 96 ca 8d
  ALL : 0460:  8d 02 03 01 00 01 a3 72 30 70 30 0f 06 03 55 1d
TRACE : value of 'crt->rsa.E' (17 bits) is:
  ALL : 0470:  13 01 01 ff 04 05 30 03 01 01 ff 30 1d 06 03 55
TRACE :  01 00 01
  ALL : 0480:  1d 0e 04 16 04 14 b9 0c 04 8f 50 20 aa 42 46 18
DEBUG : => write record
  ALL : 0490:  45 f9 bf 70 fc c8 c3 56 ce 7c 30 0b 06 03 55 1d
TRACE : output record: msgtype = 22, version = [3:0], msglen = 1389
  ALL : 04a0:  0f 04 04 03 02 01 06 30 11 06 09 60 86 48 01 86
  ALL : 04b0:  f8 42 01 01 04 04 03 02 00 07 30 1e 06 09 60 86
  ALL : dumping 'output record header sent to network' (5 bytes)
  ALL : 04c0:  48 01 86 f8 42 01 0d 04 11 16 0f 78 63 61 20 63
  ALL : 0000:  16 03 00 05 6d
  ALL : 04d0:  65 72 74 69 66 69 63 61 74 65 30 0d 06 09 2a 86
  ALL : dumping 'output record sent to network' (1389 bytes)
  ALL : 04e0:  48 86 f7 0d 01 01 05 05 00 03 81 81 00 b5 bb bc
  ALL : 0000:  0b 00 05 69 00 05 66 00 02 b0 30 82 02 ac 30 82
  ALL : 04f0:  9e 8a 6b 5e 97 c2 70 1b 77 db c8 ee 48 8e ed 4d
  ALL : 0010:  02 15 a0 03 02 01 02 02 01 04 30 0d 06 09 2a 86
  ALL : 0500:  0c 9c 23 0a 2c 7d b2 5a 9a d8 36 15 5f f7 82 e4
  ALL : 0020:  48 86 f7 0d 01 01 05 05 00 30 62 31 0b 30 09 06
  ALL : 0510:  93 57 3c 24 8c 3c 30 b2 7f d8 16 cd 22 32 bf 6c
  ALL : 0030:  03 55 04 06 13 02 55 4b 31 0e 30 0c 06 03 55 04
  ALL : 0520:  be dc 2f da bb 71 2d d2 72 76 47 52 9b 64 12 eb
  ALL : 0040:  08 13 05 53 54 41 54 45 31 0d 30 0b 06 03 55 04
  ALL : 0530:  42 cb c7 38 9e 5c 93 08 05 a6 e1 4b d8 81 1c 2b
  ALL : 0050:  07 13 04 43 69 74 79 31 0e 30 0c 06 03 55 04 0a
  ALL : 0540:  d8 64 e2 72 4a 4f 0c 3c 85 ca f1 ab ec 4b c1 fc
  ALL : 0060:  13 05 4d 79 4f 72 67 31 12 30 10 06 03 55 04 0b
  ALL : 0550:  4d b3 0c fa 1f 01 b9 1c f3 f6 bf e0 8e 66 c2 c7
  ALL : 0070:  13 09 4d 79 4f 72 67 55 6e 69 74 31 10 30 0e 06
  ALL : 0560:  1f aa 96 16 7e 99 ab 36 15 6a f3 7b 28
  ALL : 0080:  03 55 04 03 13 07 72 6f 6f 74 20 43 41 30 1e 17
DEBUG : => flush output
  ALL : 0090:  0d 31 33 30 39 32 31 31 38 31 30 30 30 5a 17 0d
DEBUG : message length: 1394, out_left: 1394
  ALL : 00a0:  31 34 30 39 32 31 31 38 31 30 30 30 5a 30 65 31
DEBUG : ssl->f_send (header)() returned 5 (0x5)
  ALL : 00b0:  0b 30 09 06 03 55 04 06 13 02 55 53 31 0e 30 0c
DEBUG : Can't write data on socket : An established connection was aborted by the software in your host machine.
  ALL : 00c0:  06 03 55 04 08 13 05 53 54 41 54 45 31 0d 30 0b
DEBUG : ssl->f_send() returned -78 (0xffffffb2)
  ALL : 00d0:  06 03 55 04 07 13 04 43 69 74 79 31 0e 30 0c 06
DEBUG : ssl_flush_output() returned -78 (0xffffffb2)
  ALL : 00e0:  03 55 04 0a 13 05 4d 79 4f 72 67 31 12 30 10 06
DEBUG : ssl_write_record() returned -78 (0xffffffb2)
  ALL : 00f0:  03 55 04 0b 13 09 4d 79 4f 72 67 55 6e 69 74 31
DEBUG : <= handshake
  ALL : 0100:  13 30 11 06 03 55 04 03 13 0a 4d 43 53 41 47 46
DEBUG : Exception (78) : SSL server handshake failed : NET - Sending information through the socket failed
  ALL : 0110:  43 4d 30 31 30 81 9f 30 0d 06 09 2a 86 48 86 f7
  ALL : 0120:  0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81
  ALL : 0130:  00 ba c9 d1 d6 a1 58 5c d7 46 c1 bf 16 67 f4 04
  ALL : 0140:  58 a1 1a 0a 7b eb 24 b4 07 b6 9e 93 c3 7c fe e6
  ALL : 0150:  cb 21 94 61 ba 57 b0 bf f6 31 33 5b b1 d0 e1 08
  ALL : 0160:  c5 26 a9 64 d7 76 0f 6c f3 3c 28 69 5a bd 4a ac
  ALL : 0170:  a3 56 f1 c5 08 4f 61 c2 0e d9 d5 27 54 83 a0 e4
  ALL : 0180:  55 8b ff 59 d7 f6 eb 5d f6 b9 d3 e7 f5 2f 92 56
  ALL : 0190:  43 ca 17 fb 6a 4f 15 14 93 1d 46 11 f8 e2 d4 16
  ALL : 01a0:  b4 1d 11 0e 98 e5 74 f6 cd 7c b2 5f f3 64 c0 b2
  ALL : 01b0:  c9 02 03 01 00 01 a3 6f 30 6d 30 0c 06 03 55 1d
  ALL : 01c0:  13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 0e 04
  ALL : 01d0:  16 04 14 c8 8a c1 d0 02 19 58 fe 86 b3 e6 95 b7
  ALL : 01e0:  1e 1d c3 f2 11 d0 34 30 0b 06 03 55 1d 0f 04 04
  ALL : 01f0:  03 02 05 e0 30 11 06 09 60 86 48 01 86 f8 42 01
  ALL : 0200:  01 04 04 03 02 06 40 30 1e 06 09 60 86 48 01 86
  ALL : 0210:  f8 42 01 0d 04 11 16 0f 78 63 61 20 63 65 72 74
  ALL : 0220:  69 66 69 63 61 74 65 30 0d 06 09 2a 86 48 86 f7
  ALL : 0230:  0d 01 01 05 05 00 03 81 81 00 2e 5a b9 4e 1b ab
  ALL : 0240:  9d ea 2e 74 b9 25 c0 20 0d 08 52 c2 08 2f d4 39
  ALL : 0250:  3a 16 21 e1 53 bb 86 09 cb c3 4c ba bf 31 94 77
  ALL : 0260:  64 9a ae fe cd 6b c9 c1 80 5d 8d 23 24 87 0f 8d
  ALL : 0270:  58 84 a9 2f b1 9b ec c9 83 4c 53 44 55 0e 30 52
  ALL : 0280:  ed cd dc 2a 89 40 07 c6 81 d3 ec a9 17 80 c5 2f
  ALL : 0290:  cc a8 1c 46 94 71 e5 f6 92 de 88 a2 c8 bc a0 24
  ALL : 02a0:  c4 be cc 16 0c 6e f8 a8 df 8a 9f ed 78 c0 80 83
  ALL : 02b0:  5c 58 86 eb 06 43 a5 08 4b 25 00 02 b0 30 82 02
  ALL : 02c0:  ac 30 82 02 15 a0 03 02 01 02 02 01 01 30 0d 06
  ALL : 02d0:  09 2a 86 48 86 f7 0d 01 01 05 05 00 30 62 31 0b
  ALL : 02e0:  30 09 06 03 55 04 06 13 02 55 4b 31 0e 30 0c 06
  ALL : 02f0:  03 55 04 08 13 05 53 54 41 54 45 31 0d 30 0b 06
  ALL : 0300:  03 55 04 07 13 04 43 69 74 79 31 0e 30 0c 06 03
  ALL : 0310:  55 04 0a 13 05 4d 79 4f 72 67 31 12 30 10 06 03
  ALL : 0320:  55 04 0b 13 09 4d 79 4f 72 67 55 6e 69 74 31 10
  ALL : 0330:  30 0e 06 03 55 04 03 13 07 72 6f 6f 74 20 43 41
  ALL : 0340:  30 1e 17 0d 31 33 30 39 32 31 31 38 30 37 30 30
  ALL : 0350:  5a 17 0d 32 33 30 39 32 31 31 38 30 37 30 30 5a
  ALL : 0360:  30 62 31 0b 30 09 06 03 55 04 06 13 02 55 4b 31
  ALL : 0370:  0e 30 0c 06 03 55 04 08 13 05 53 54 41 54 45 31
  ALL : 0380:  0d 30 0b 06 03 55 04 07 13 04 43 69 74 79 31 0e
  ALL : 0390:  30 0c 06 03 55 04 0a 13 05 4d 79 4f 72 67 31 12
  ALL : 03a0:  30 10 06 03 55 04 0b 13 09 4d 79 4f 72 67 55 6e
  ALL : 03b0:  69 74 31 10 30 0e 06 03 55 04 03 13 07 72 6f 6f
  ALL : 03c0:  74 20 43 41 30 81 9f 30 0d 06 09 2a 86 48 86 f7
  ALL : 03d0:  0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81
  ALL : 03e0:  00 f2 84 d3 79 96 cf c7 09 61 87 a7 7c ed c3 da
  ALL : 03f0:  0b ce a8 d0 ec 51 7c 59 f5 18 29 6b 69 18 68 32
  ALL : 0400:  da 3a 96 06 d3 22 75 bf c2 68 95 af 36 aa f4 6b
  ALL : 0410:  fd cd 20 9f 74 c0 10 8a 17 17 30 ef 4f de 77 19
  ALL : 0420:  5c f9 82 34 82 6f 3f 57 8c 05 a0 d1 26 b8 39 fb
  ALL : 0430:  93 15 59 0a b0 64 ba 04 50 f1 fe 34 34 77 2c 9e
  ALL : 0440:  c0 9a 90 e8 22 91 cd 1a f9 c3 ee 9d c0 3d f9 47
  ALL : 0450:  c0 4d fa 5b 64 a5 e1 57 b7 13 8f 2e 45 a9 96 ca
  ALL : 0460:  8d 02 03 01 00 01 a3 72 30 70 30 0f 06 03 55 1d
  ALL : 0470:  13 01 01 ff 04 05 30 03 01 01 ff 30 1d 06 03 55
  ALL : 0480:  1d 0e 04 16 04 14 b9 0c 04 8f 50 20 aa 42 46 18
  ALL : 0490:  45 f9 bf 70 fc c8 c3 56 ce 7c 30 0b 06 03 55 1d
  ALL : 04a0:  0f 04 04 03 02 01 06 30 11 06 09 60 86 48 01 86
  ALL : 04b0:  f8 42 01 01 04 04 03 02 00 07 30 1e 06 09 60 86
  ALL : 04c0:  48 01 86 f8 42 01 0d 04 11 16 0f 78 63 61 20 63
  ALL : 04d0:  65 72 74 69 66 69 63 61 74 65 30 0d 06 09 2a 86
DEBUG : => free
  ALL : 04e0:  48 86 f7 0d 01 01 05 05 00 03 81 81 00 b5 bb bc
DEBUG : <= free
  ALL : 04f0:  9e 8a 6b 5e 97 c2 70 1b 77 db c8 ee 48 8e ed 4d
  ALL : 0500:  0c 9c 23 0a 2c 7d b2 5a 9a d8 36 15 5f f7 82 e4
  ALL : 0510:  93 57 3c 24 8c 3c 30 b2 7f d8 16 cd 22 32 bf 6c
  ALL : 0520:  be dc 2f da bb 71 2d d2 72 76 47 52 9b 64 12 eb
  ALL : 0530:  42 cb c7 38 9e 5c 93 08 05 a6 e1 4b d8 81 1c 2b
  ALL : 0540:  d8 64 e2 72 4a 4f 0c 3c 85 ca f1 ab ec 4b c1 fc
  ALL : 0550:  4d b3 0c fa 1f 01 b9 1c f3 f6 bf e0 8e 66 c2 c7
  ALL : 0560:  1f aa 96 16 7e 99 ab 36 15 6a f3 7b 28
DEBUG : => flush output
DEBUG : message length: 1394, out_left: 1394
DEBUG : ssl->f_send (header)() returned 5 (0x5)
DEBUG : Can't write data on socket : An established connection was aborted by the software in your host machine.
DEBUG : ssl->f_send() returned -78 (0xffffffb2)
DEBUG : ssl_flush_output() returned -78 (0xffffffb2)
DEBUG : ssl_write_record() returned -78 (0xffffffb2)
DEBUG : <= handshake
DEBUG : Exception (78) : SSL server handshake failed : NET - Sending information through the socket failed
DEBUG : => free
DEBUG : <= free
 
Sep 21, 2013 21:07
ioio

I made some more tests... indeed, removing TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 from the server ssl_set_ciphersuites list solves the problem ... but i wish i could keep it in the list ...

is it a bug from polarssl or from chrome ?

 
Jan 14, 2017 08:47
John Smith

I am Having err_ssl_protocol_error problem in my PC.

 
Jan 16, 2017 06:12
John Smith

I found my fix here http://www.deskdecode.com/err_ssl_protocol_error/

everything is working now