It did help some, yes. I'm trying to get to a point where I can
reproduce the issue because it isn't immediately clear why that last
record is causing the ShortBufferException. I'm hoping there's a way to
do that without having to hit that discord server. Ideally I'd need to
turn this into some kind of regression test that more easily isolates
the issue.
--Jamil
On 5/23/2019 11:24 AM, Norman Maurer wrote:
Hi there,
Did the debug log help at all or should I try to gather more
informations from the user ?
Bye
Norman
On 17. May 2019, at 21:26, Norman Maurer
<norman.mau...@googlemail.com <mailto:norman.mau...@googlemail.com>>
wrote:
The user did capture the log here:
https://hasteb.in/ucalevob.makefile
Hopefully it is helpful,
Norman
On 17. May 2019, at 20:38, Norman Maurer
<norman.mau...@googlemail.com <mailto:norman.mau...@googlemail.com>>
wrote:
Unfortunately I am very busy atm so it may take me a few days. I
asked the original reported of the issue to provide some in the
netty issue tracker. I will come back to you.
Bye
Norman
On 17. May 2019, at 20:27, Xuelei Fan <xuelei....@oracle.com
<mailto:xuelei....@oracle.com>> wrote:
Hi Norman,
If you are able to reproduce this issue, would you mind post the
JSSE debug log (by using Java System Property, "javax.net.debug=all")?
Please feel free to submit a bug.
Thanks & Regards,
Xuelei
On 5/17/2019 11:02 AM, Norman Maurer wrote:
Hi there,
We recently received a bug report in netty when JDK12 is used with
ChaCha chiphers:
https://github.com/netty/netty/issues/9150
Basically it seems like there is a problem in how it uses the
ByteBuffer internally:
|Caused by: java.lang.RuntimeException:
javax.crypto.ShortBufferException: Output buffer too small at
java.base/com.sun.crypto.provider.ChaCha20Cipher.engineDoFinal(ChaCha20Cipher.java:703)
at
java.base/javax.crypto.CipherSpi.bufferCrypt(CipherSpi.java:826)
at
java.base/javax.crypto.CipherSpi.engineDoFinal(CipherSpi.java:730)
at java.base/javax.crypto.Cipher.doFinal(Cipher.java:2503) at
java.base/sun.security.ssl.SSLCipher$T12CC20P1305ReadCipherGenerator$CC20P1305ReadCipher.decrypt(SSLCipher.java:2188)
at
java.base/sun.security.ssl.SSLEngineInputRecord.decodeInputRecord(SSLEngineInputRecord.java:240)
at
java.base/sun.security.ssl.SSLEngineInputRecord.decode(SSLEngineInputRecord.java:197)
at
java.base/sun.security.ssl.SSLEngineInputRecord.decode(SSLEngineInputRecord.java:160)
at
java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:108)
at
java.base/sun.security.ssl.SSLEngineImpl.decode(SSLEngineImpl.java:681)
at
java.base/sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:636)
at
java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:454)
... 25 common frames omitted Caused by:
javax.crypto.ShortBufferException: Output buffer too small at
java.base/com.sun.crypto.provider.ChaCha20Cipher$EngineAEADDec.doFinal(ChaCha20Cipher.java:1360)
at
java.base/com.sun.crypto.provider.ChaCha20Cipher.engineDoFinal(ChaCha20Cipher.java:701)|
Unfortunately I have no standalone reproducer yet but I just
wanted to bring it up here in case it helps.
It only happens on JDK12 it seems. Check the Netty issue for more
details…
Bye
Norman