<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
It did help some, yes. I'm trying to get to a point where I can
reproduce the issue because it isn't immediately clear why that last
record is causing the ShortBufferException. I'm hoping there's a
way to do that without having to hit that discord server. Ideally
I'd need to turn this into some kind of regression test that more
easily isolates the issue.<br>
<br>
--Jamil<br>
<br>
<div class="moz-cite-prefix">On 5/23/2019 11:24 AM, Norman Maurer
wrote:<br>
</div>
<blockquote type="cite"
cite="mid:B5990BE5-63D1-4008-B2B6-89E5FF3D4FE5@googlemail.com">
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
Hi there,
<div class=""><br class="">
</div>
<div class=""><br class="">
</div>
<div class="">Did the debug log help at all or should I try to
gather more informations from the user ?</div>
<div class=""><br class="">
</div>
<div class="">Bye</div>
<div class="">Norman</div>
<div class=""><br class="">
<div><br class="">
<blockquote type="cite" class="">
<div class="">On 17. May 2019, at 21:26, Norman Maurer <<a
href="mailto:norman.maurer@googlemail.com" class=""
moz-do-not-send="true">norman.maurer@googlemail.com</a>>
wrote:</div>
<br class="Apple-interchange-newline">
<div class="">
<meta http-equiv="Content-Type" content="text/html;
charset=UTF-8" class="">
<div style="word-wrap: break-word; -webkit-nbsp-mode:
space; line-break: after-white-space;" class="">The user
did capture the log here:
<div class=""><br class="">
</div>
<div class=""><a
href="https://hasteb.in/ucalevob.makefile" class=""
moz-do-not-send="true">https://hasteb.in/ucalevob.makefile</a></div>
<div class=""><br class="">
</div>
<div class="">Hopefully it is helpful,</div>
<div class=""><br class="">
</div>
<div class="">Norman</div>
<div class=""><br class="">
<div class=""><br class="">
<blockquote type="cite" class="">
<div class="">On 17. May 2019, at 20:38, Norman
Maurer <<a
href="mailto:norman.maurer@googlemail.com"
class="" moz-do-not-send="true">norman.maurer@googlemail.com</a>>
wrote:</div>
<br class="Apple-interchange-newline">
<div class="">
<div class="">Unfortunately I am very busy atm
so it may take me a few days. I asked the
original reported of the issue to provide some
in the netty issue tracker. I will come back
to you.<br class="">
<br class="">
Bye<br class="">
Norman<br class="">
<br class="">
<br class="">
<blockquote type="cite" class="">On 17. May
2019, at 20:27, Xuelei Fan <<a
href="mailto:xuelei.fan@oracle.com"
class="" moz-do-not-send="true">xuelei.fan@oracle.com</a>>
wrote:<br class="">
<br class="">
Hi Norman,<br class="">
<br class="">
If you are able to reproduce this issue,
would you mind post the JSSE debug log (by
using Java System Property,
"javax.net.debug=all")?<br class="">
<br class="">
Please feel free to submit a bug.<br
class="">
<br class="">
Thanks & Regards,<br class="">
Xuelei<br class="">
<br class="">
On 5/17/2019 11:02 AM, Norman Maurer wrote:<br
class="">
<blockquote type="cite" class="">Hi there,<br
class="">
We recently received a bug report in netty
when JDK12 is used with ChaCha chiphers:<br
class="">
<a
href="https://github.com/netty/netty/issues/9150"
class="" moz-do-not-send="true">https://github.com/netty/netty/issues/9150</a><br
class="">
Basically it seems like there is a problem
in how it uses the ByteBuffer internally:<br
class="">
|Caused by: java.lang.RuntimeException:
javax.crypto.ShortBufferException: Output
buffer too small at
java.base/com.sun.crypto.provider.ChaCha20Cipher.engineDoFinal(ChaCha20Cipher.java:703)
at
java.base/javax.crypto.CipherSpi.bufferCrypt(CipherSpi.java:826)
at
java.base/javax.crypto.CipherSpi.engineDoFinal(CipherSpi.java:730)
at
java.base/javax.crypto.Cipher.doFinal(Cipher.java:2503)
at
java.base/sun.security.ssl.SSLCipher$T12CC20P1305ReadCipherGenerator$CC20P1305ReadCipher.decrypt(SSLCipher.java:2188)
at
java.base/sun.security.ssl.SSLEngineInputRecord.decodeInputRecord(SSLEngineInputRecord.java:240)
at
java.base/sun.security.ssl.SSLEngineInputRecord.decode(SSLEngineInputRecord.java:197)
at
java.base/sun.security.ssl.SSLEngineInputRecord.decode(SSLEngineInputRecord.java:160)
at
java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:108)
at
java.base/sun.security.ssl.SSLEngineImpl.decode(SSLEngineImpl.java:681)
at
java.base/sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:636)
at
java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:454)
... 25 common frames omitted Caused by:
javax.crypto.ShortBufferException: Output
buffer too small at
java.base/com.sun.crypto.provider.ChaCha20Cipher$EngineAEADDec.doFinal(ChaCha20Cipher.java:1360)
at
java.base/com.sun.crypto.provider.ChaCha20Cipher.engineDoFinal(ChaCha20Cipher.java:701)|<br
class="">
Unfortunately I have no standalone
reproducer yet but I just wanted to bring
it up here in case it helps.<br class="">
It only happens on JDK12 it seems. Check
the Netty issue for more details…<br
class="">
Bye<br class="">
Norman<br class="">
</blockquote>
</blockquote>
<br class="">
</div>
</div>
</blockquote>
</div>
<br class="">
</div>
</div>
</div>
</blockquote>
</div>
<br class="">
</div>
</blockquote>
<br>
</body>
</html>