Sięgnąłem więc po oprogramowanie GNUTLS. Znalazłem dwa przykłady, serwer i klient, nie wymagające uwierzytelnienia:
Kod: Zaznacz cały
Simple client example with anonymous authentication
Echo Server with anonymous authentication
Programy zatrzymywały komunikację na:
Kod: Zaznacz cały
gnutls_handshake()
Serwer:
Kod: Zaznacz cały
WARNING: gnome-keyring:: couldn't connect to: /tmp/keyring-MWg96J/pkcs11: No such file or directory
Server ready.
LOG* 4 * REC[0x8e35410]: Allocating epoch #0
LOG* 2 * ASSERT: gnutls_priority.c:832
Connection from: 127.0.0.1
4 : TEST
LOG* 2 * ASSERT: gnutls_constate.c:695
LOG* 4 * REC[0x8e35410]: Allocating epoch #1
LOG* 7 * READ: Got 0 bytes from 0x5
LOG* 7 * READ: read 0 bytes from 0x5
LOG* 2 * ASSERT: gnutls_buffers.c:640
LOG* 2 * ASSERT: gnutls_record.c:969
LOG* 2 * ASSERT: gnutls_handshake.c:2991
LOG* 6 * BUF[HSK]: Cleared Data from buffer
LOG* 6 * BUF[HSK]: Cleared Data from buffer
LOG* 4 * REC[0x8e35410]: Epoch #0 freed
LOG* 4 * REC[0x8e35410]: Epoch #1 freed
Handshake failed A TLS packet with unexpected length was received.
LOG* 4 * REC[0x8e35410]: Allocating epoch #0
LOG* 2 * ASSERT: gnutls_priority.c:832
Kod: Zaznacz cały
WARNING: gnome-keyring:: couldn't connect to: /tmp/keyring-MWg96J/pkcs11: No such file or directory
LOG* 4 * REC[0x94bb4f8]: Allocating epoch #0
LOG* 2 * ASSERT: gnutls_priority.c:832
connecting...
LOG* 2 * ASSERT: gnutls_constate.c:695
LOG* 4 * REC[0x94bb4f8]: Allocating epoch #1
LOG* 2 * ASSERT: gnutls_handshake.c:2067
LOG* 2 * ASSERT: gnutls_handshake.c:2753
LOG* 6 * BUF[HSK]: Cleared Data from buffer
Handshake failed
GnuTLS error: GnuTLS internal error.
LOG* 6 * BUF[HSK]: Cleared Data from buffer
LOG* 4 * REC[0x94bb4f8]: Epoch #0 freed
LOG* 4 * REC[0x94bb4f8]: Epoch #1 freed
Kogo mam zapytać? Twórcy GNUTLS, opiekuna pakietu?
Jeżeli GNUTLS nie działa to może spróbować czegoś innego. Proszę o przykład.
Mój system: Debian testowy i686