Skip to content

Instantly share code, notes, and snippets.

@DrRamm
Created April 4, 2018 07:13
Show Gist options
  • Save DrRamm/776cfa45d2867f72e344a918cf2f7329 to your computer and use it in GitHub Desktop.
Save DrRamm/776cfa45d2867f72e344a918cf2f7329 to your computer and use it in GitHub Desktop.
dex2oatd I 04-04 13:57:45 32672 32672 dex2oat.cc:2812] CFI info dedupe: 0 collisions, 0 max hash collisions, 7049/17085 probe distance, 342699606 ns hash time
dex2oatd W 04-04 13:57:46 32672 32672 runtime.cc:291] Current thread not detached in Runtime shutdown
[ 93% 2201/2355] Building with Jack: /home/wa00/crdroid/out/target/common/obj/APPS/ExternalStorageProvider_intermediates/with-local/classes.dex
Connection to the Jack server timeout, retrying with debug
* Trying ::1...
* TCP_NODELAY set
* connect to ::1 port 8076 failed: В соединении отказано
* Trying 127.0.0.1...
* TCP_NODELAY set
* Connected to localhost (127.0.0.1) port 8076 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /home/wa00/.jack-server/server.pem
CApath: /etc/ssl/certs
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS handshake, Server hello (2):
{ [81 bytes data]
* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [725 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [333 bytes data]
* TLSv1.2 (IN), TLS handshake, Request CERT (13):
{ [67 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS handshake, Certificate (11):
} [735 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2 (OUT), TLS handshake, CERT verify (15):
} [264 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
{ [1 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* ALPN, server did not agree to a protocol
* Server certificate:
* subject: CN=localhost
* start date: Mar 28 11:51:23 2018 GMT
* expire date: Mar 25 11:51:23 2028 GMT
* common name: localhost (matched)
* issuer: CN=localhost
* SSL certificate verify ok.
} [5 bytes data]
> POST /jack HTTP/1.1
> Host: localhost:8076
> User-Agent: curl/7.52.1
> Accept: application/vnd.jack.command-out-base64;version=1;charset=UTF-8
> Content-Length: 1749
> Expect: 100-continue
> Content-Type: multipart/form-data; boundary=------------------------8fef81e04825379c
>
{ [5 bytes data]
< HTTP/1.1 100 Continue
} [5 bytes data]
< HTTP/1.1 200 OK
< Content-Type: application/vnd.jack.command-out; version=1
< Connection: keep-alive
< Transfer-Encoding: chunked
<
{ [5 bytes data]
* Curl_http_done: called premature == 0
* Connection #0 to host localhost left intact
[ 93% 2203/2355] Building with Jack: /home/wa00/crdroid/out/target/common/obj/APPS/FMRadio_intermediates/with-local/classes.dex
Connection to the Jack server timeout, retrying with debug
* Trying ::1...
* TCP_NODELAY set
* connect to ::1 port 8076 failed: В соединении отказано
* Trying 127.0.0.1...
* TCP_NODELAY set
* Connected to localhost (127.0.0.1) port 8076 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /home/wa00/.jack-server/server.pem
CApath: /etc/ssl/certs
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS handshake, Server hello (2):
{ [81 bytes data]
* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [725 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [333 bytes data]
* TLSv1.2 (IN), TLS handshake, Request CERT (13):
{ [67 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS handshake, Certificate (11):
} [735 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2 (OUT), TLS handshake, CERT verify (15):
} [264 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
{ [1 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* ALPN, server did not agree to a protocol
* Server certificate:
* subject: CN=localhost
* start date: Mar 28 11:51:23 2018 GMT
* expire date: Mar 25 11:51:23 2028 GMT
* common name: localhost (matched)
* issuer: CN=localhost
* SSL certificate verify ok.
} [5 bytes data]
> POST /jack HTTP/1.1
> Host: localhost:8076
> User-Agent: curl/7.52.1
> Accept: application/vnd.jack.command-out-base64;version=1;charset=UTF-8
> Content-Length: 1690
> Expect: 100-continue
> Content-Type: multipart/form-data; boundary=------------------------dbfcae375d7c2e2e
>
{ [5 bytes data]
< HTTP/1.1 100 Continue
} [5 bytes data]
< HTTP/1.1 200 OK
< Content-Type: application/vnd.jack.command-out; version=1
< Connection: keep-alive
< Transfer-Encoding: chunked
<
{ [5 bytes data]
* Curl_http_done: called premature == 0
* Connection #0 to host localhost left intact
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment