Hi,
We have implemented a protocol with ssl with Mina-2.0.7 that works fine in jdk5 but fails in jdk6. The first send is always correct but the second fails : the first byte 00 is sent alone in this trace

Application data to be sent :
00 4B C0 11 53 00 09 0A 0B 01 00 0C 05 54 45 53 54 41 0D 03 4D FE 27 0F 01 00 10 01 00 11 01 01 19 02 4E 20 1E 0A 1F 01 80 20 02 5D C0 21 01 00 28 06 29 01 00 2A 01 08 32 0E 33 0C 31 32 30 35 32 32 31 36 30 32 30 31 63 01 20

================> MINA2.0.7 JDK1.5.0_22  :  works fine

Java 5 debug trace (begin)
%% Cached client session: [Session-3, SSL_RSA_WITH_3DES_EDE_CBC_SHA]

Padded plaintext before ENCRYPTION:  len = 72
0000: 00 2C 40 20 00 50 03 08   4F 52 49 41 44 45 31 35
0010: 04 07 4D 59 43 46 54 35   31 06 01 02 07 03 00 24
0020: 06 16 01 02 63 06 4F 52   49 41 44 45 90 C9 A9 49
0030: C7 6E C5 2C 09 78 5F F4   44 0D 05 CB 8F 8B E3 74
0040: 07 07 07 07 07 07 07 07
IS-Xfer-forward ID 1842008 TESTA, WRITE: TLSv1 Application Data, length = 44

[Raw write (bb)]: length = 77
0000: 17 03 01 00 48 C9 31 9D   F4 6A F9 DE C2 CC 6D 55
0010: FD 9D 95 1A ED 4F 5D 1A   1B 80 98 15 0D 3F 83 CE
0020: FB 1C A1 D1 B0 D3 AC 4D   F2 0D CF E0 43 E8 5D 71
0030: 87 E3 40 11 F3 D7 BB 13   56 5E 64 6F 8D 34 C2 79
0040: 2E 33 01 EF 78 A6 6E 93   ED A4 2C 2E 7F

[Raw read (bb)]: length = 45
0000: .........
Padded plaintext after DECRYPTION:  len = 40
0000: .........

-----------------------------------CORRECT SEND
Padded plaintext before ENCRYPTION:  len = 96
0000: 00 4B C0 11 53 00 09 0A   0B 01 00 0C 05 54 45 53
0010: 54 41 0D 03 1D FC 7C 0F   01 00 10 01 00 11 01 01
0020: 19 02 4E 20 1E 0A 1F 01   80 20 02 5D C0 21 01 00
0030: 28 06 29 01 00 2A 01 08   32 0E 33 0C 31 32 30 35
0040: 32 32 31 36 30 32 30 31   63 01 20 80 BA A4 B5 A5
0050: 8D D6 77 60 67 B6 24 EA   65 2B 20 44 61 6D 95 00
NioProcessor-14, WRITE: TLSv1 Application Data, length = 75
[Raw write (bb)]: length = 101
.............................
Java 5 debug trace (end)

================> MINA2.0.7 JDK1.6.0_45 : fails

Java 6 debug trace (begin)
%% Cached client session: [Session-3, SSL_RSA_WITH_3DES_EDE_CBC_SHA]

Padded plaintext before ENCRYPTION:  len = 72
0000: 00 2C 40 20 00 50 03 08   4F 52 49 41 44 45 31 35
0010: 04 07 4D 59 43 46 54 35   31 06 01 02 07 03 00 24
0020: 06 16 01 02 63 06 4F 52   49 41 44 45 92 09 D3 64
0030: 28 62 59 A0 FF 14 3C 72   8F EF C0 D0 E1 B4 2A B9
0040: 07 07 07 07 07 07 07 07
IS-Xfer-forward ID 1708272 TESTA, WRITE: TLSv1 Application Data, length = 44
[Raw write (bb)]: length = 77
0000: 17 03 01 00 48 F5 70 37   B4 80 9F 96 4E 83 1A 9F
0010: ED A6 0E 6E 8A 92 89 24   BB 12 EF 88 99 CB 16 FD
0020: BB 4D C0 B5 F6 F7 CF 09   43 87 71 A4 88 22 E5 7B
0030: 78 DA 88 0D A1 00 E5 88   58 5D 28 D8 9F 2C 5D B4
0040: EB 06 7D 08 ED 80 EF 1F   3A 0B 2C 9F 8D

[Raw read (bb)]: length = 45
0000: .........
Padded plaintext after DECRYPTION:  len = 40
0000: .........

-----------------------------------INVALID SEND
Padded plaintext before ENCRYPTION:  len = 24
0000: 00 DA D5 04 54 FF E0 9F   75 91 4E 85 19 BB 0D AA
0010: AF 08 A4 06 6A 02 02 02
NioProcessor-8, WRITE: TLSv1 Application Data, length = 1
Padded plaintext before ENCRYPTION:  len = 96
0000: 4B C0 11 53 00 09 0A 0B   01 00 0C 05 54 45 53 54
0010: 41 0D 03 4D FE 27 0F 01   00 10 01 00 11 01 01 19
0020: 02 4E 20 1E 0A 1F 01 80   20 02 5D C0 21 01 00 28
0030: 06 29 01 00 2A 01 08 32   0E 33 0C 31 32 30 35 32
0040: 32 31 36 30 32 30 31 63   01 20 7E D0 15 84 96 10
0050: A4 E2 64 28 EC 77 A6 C8   FC 20 10 DE CD D9 01 01
NioProcessor-8, WRITE: TLSv1 Application Data, length = 74
[Raw write (bb)]: length = 130
.......
Java 6 debug trace (end)

Thanks.

Reply via email to