Hi there,

Did the debug log help at all or should I try to gather more informations from 
the user ?

Bye
Norman


> On 17. May 2019, at 21:26, Norman Maurer <norman.mau...@googlemail.com> wrote:
> 
> The user did capture the log here:
> 
> https://hasteb.in/ucalevob.makefile <https://hasteb.in/ucalevob.makefile>
> 
> Hopefully it is helpful,
> 
> Norman
> 
> 
>> On 17. May 2019, at 20:38, Norman Maurer <norman.mau...@googlemail.com 
>> <mailto:norman.mau...@googlemail.com>> wrote:
>> 
>> Unfortunately I am very busy atm so it may take me a few days. I asked the 
>> original reported of the issue to provide some in the netty issue tracker. I 
>> will come back to you.
>> 
>> Bye
>> Norman
>> 
>> 
>>> On 17. May 2019, at 20:27, Xuelei Fan <xuelei....@oracle.com 
>>> <mailto:xuelei....@oracle.com>> wrote:
>>> 
>>> Hi Norman,
>>> 
>>> If you are able to reproduce this issue, would you mind post the JSSE debug 
>>> log (by using Java System Property, "javax.net.debug=all")?
>>> 
>>> Please feel free to submit a bug.
>>> 
>>> Thanks & Regards,
>>> Xuelei
>>> 
>>> On 5/17/2019 11:02 AM, Norman Maurer wrote:
>>>> Hi there,
>>>> We recently received a bug report in netty when JDK12 is used with ChaCha 
>>>> chiphers:
>>>> https://github.com/netty/netty/issues/9150 
>>>> <https://github.com/netty/netty/issues/9150>
>>>> Basically it seems like there is a problem in how it uses the ByteBuffer 
>>>> internally:
>>>> |Caused by: java.lang.RuntimeException: javax.crypto.ShortBufferException: 
>>>> Output buffer too small at 
>>>> java.base/com.sun.crypto.provider.ChaCha20Cipher.engineDoFinal(ChaCha20Cipher.java:703)
>>>>  at java.base/javax.crypto.CipherSpi.bufferCrypt(CipherSpi.java:826) at 
>>>> java.base/javax.crypto.CipherSpi.engineDoFinal(CipherSpi.java:730) at 
>>>> java.base/javax.crypto.Cipher.doFinal(Cipher.java:2503) at 
>>>> java.base/sun.security.ssl.SSLCipher$T12CC20P1305ReadCipherGenerator$CC20P1305ReadCipher.decrypt(SSLCipher.java:2188)
>>>>  at 
>>>> java.base/sun.security.ssl.SSLEngineInputRecord.decodeInputRecord(SSLEngineInputRecord.java:240)
>>>>  at 
>>>> java.base/sun.security.ssl.SSLEngineInputRecord.decode(SSLEngineInputRecord.java:197)
>>>>  at 
>>>> java.base/sun.security.ssl.SSLEngineInputRecord.decode(SSLEngineInputRecord.java:160)
>>>>  at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:108) 
>>>> at java.base/sun.security.ssl.SSLEngineImpl.decode(SSLEngineImpl.java:681) 
>>>> at 
>>>> java.base/sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:636)
>>>>  at 
>>>> java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:454) 
>>>> ... 25 common frames omitted Caused by: javax.crypto.ShortBufferException: 
>>>> Output buffer too small at 
>>>> java.base/com.sun.crypto.provider.ChaCha20Cipher$EngineAEADDec.doFinal(ChaCha20Cipher.java:1360)
>>>>  at 
>>>> java.base/com.sun.crypto.provider.ChaCha20Cipher.engineDoFinal(ChaCha20Cipher.java:701)|
>>>> Unfortunately I have no standalone reproducer yet but I just wanted to 
>>>> bring it up here in case it helps.
>>>> It only happens on JDK12 it seems. Check the Netty issue for more details…
>>>> Bye
>>>> Norman
>> 
> 

Reply via email to